14 episodes

Research is at the heart of ESET and its technology and has been from the very beginning until today. In the ESET Research podcast, we want to give the world a chance to hear all the details directly from our world-class researchers.

ESET Research podcast ESET Research

    • Technology
    • 5.0 • 2 Ratings

Research is at the heart of ESET and its technology and has been from the very beginning until today. In the ESET Research podcast, we want to give the world a chance to hear all the details directly from our world-class researchers.

    Threat Report H2 2023: ChatGPT, the MOVEit hack, and Pandora

    Threat Report H2 2023: ChatGPT, the MOVEit hack, and Pandora

    In 2023, ESET detected over 675,000 attempts to access malicious domains abusing the popularity of ChatGPT; some offer bring-your-own-key web apps that can steal OpenAI API keys. Apart from AI, in H2 the Cl0p ransomware gang exploited MOVEit software, causing a staggering $14 billion in damages. The IoT landscape faced the new Pandora botnet, compromising Android devices via malicious firmware updates or pirated content apps.

    • 20 min
    Neanderthals, Mammoths and Telekopye

    Neanderthals, Mammoths and Telekopye

    In this episode, ESET researchers Radek Jizba and Jakub Souček talk the dynamics within and between various Neanderthal groups, techniques these hordes use to find and select the best Mammoths and especially about how Neanderthals teach each other how to use a cybercriminal toolkit called Telekopye to scam unsuspecting users on online marketplaces.

    • 38 min
    Threat Report H1 2023: Sextortion, usury and brute-force

    Threat Report H1 2023: Sextortion, usury and brute-force

    In H1 2023, intrusion vectors were closing left and right, forcing cybercriminals to revisit old routes such as brute-forcing MS SQL servers or distributing (AI-generated?) sextortion and text-based email messages and led a few to kickstart several usury Android apps. But there’s also good news as Emotet botnet went quiet after a month of ineffective campaigning, and Redline stealer has been disrupted by ESET researchers and their friends at Flare systems.

    • 20 min
    MoustachedBouncer

    MoustachedBouncer

    What do Disco, NightClub, backdoors, espionage, and internet service providers in Belarus all have in common? They all are tied to the same MoustachedBouncer. While it sounds like a bad joke, these are some of the key findings of ESET’s latest research focusing on a recently discovered APT group described in this episode by ESET’s Director of Threat Research Jean-Ian Boutin.

    • 24 min
    Finding the mythical BlackLotus bootkit

    Finding the mythical BlackLotus bootkit

    Towards the end of 2022, an unknown threat actor posted an ad for a new and powerful UEFI bootkit called BlackLotus. Its most distinctive feature? This malware could bypass UEFI Secure Boot, a feature preventing modern computers from running unauthorized software. What sounded like a myth turned into reality a few months later, when ESET Malware Researcher Martin Smolár found a sample that perfectly matched the description.

    • 20 min
    How I (could’ve) stolen your corporate secrets for $100

    How I (could’ve) stolen your corporate secrets for $100

    What do you need to break into a corporate network? ESET’s latest research suggests that interest in secondhand computer hardware, a bit of time, and $100 is more than enough. In this episode, ESET Specialized Security Researcher Cameron Camp explains to host Aryeh Goretsky what secrets he found on secondhand routers bought online, what types of companies he would be able to penetrate with that information, and how to securely wipe devices before selling them

    • 21 min

Customer Reviews

5.0 out of 5
2 Ratings

2 Ratings

Top Podcasts In Technology

Technologický podcast SHARE | Živé.sk | HernáZóna.sk
Ringier Slovakia Media s.r.o.
Klik
SME.sk
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
Darknet Diaries
Jack Rhysider
AI Masterclass
David Shapiro

You Might Also Like