Generative Data Intelligence

Tag: process discovery

Evasive Panda leverages Monlam Festival to target Tibetans

ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans through a targeted watering hole (also known as...

Top News

Operation Jacana: Foundling hobbits in Guyana

In February 2023, ESET researchers detected a spearphishing campaign targeting a governmental entity in Guyana. While we haven’t been able to link the campaign,...

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

ESET researchers have uncovered a Lazarus attack against an aerospace company in Spain, where the group deployed several tools, most notably a publicly undocumented...

Stealth Falcon preying over Middle Eastern skies with Deadglyph

For years, the Middle East has maintained its reputation as a fertile ground for advanced persistent threats (APTs). In the midst of routine monitoring...

Asylum Ambuscade: crimeware or cyberespionage?

Asylum Ambuscade is a cybercrime group that has been performing cyberespionage operations on the side. They were first publicly outed in March 2022 by...

The 2022 Robotic Process Automation (RPA) Guide | Nanonets

Over 70 to 80% of rule-based processes in customer services can be automated using RPA.RPA can expedite customer resolution by using a rule-based process...

What is process intelligence?

Process intelligence is where the art of intelligent processing and the science of decision-making meet. In the realm of business management, it is the...

Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

ESET researchers have discovered dozens of copycat Telegram and WhatsApp websites targeting mainly Android and Windows users with trojanized versions of these instant messaging...

Not‑so‑private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR to steal cryptocurrency funds ESET researchers...

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

ESET researchers discovered a campaign that we attribute with high confidence to the APT group Tick. The incident took place in the network of...

The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool...

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

ESET researchers analyze a cyberespionage campaign that distributes CapraRAT backdoors through trojanized and supposedly secure Android messaging apps – but also exfiltrates sensitive...

WinorDLL64: A backdoor from the vast Lazarus arsenal?

The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group ESET...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?