I'm not joking when I say mRNA technology is more important than "AI" and it's a tragedy we're throwing billions into one while our government is aggressively defunding the other.
Posts by Ján Trenčanský
Cisco Talos recently published an analysis of an EDR killer used by the #Qilin #ransomware gang. #ESETresearch tracks this threat as #CardSpaceKiller and we recently provided additional insights in our blog www.welivesecurity.com/en/eset-rese... 1/6
ESET Protect process tree visualization showing the execution chain of the Axios supply-chain compromise on macOS.
On macOS it's OSX/Agent.GN and "Suspicious File Dropped by Network Utility [G0305]" with "Executable Dropped by Network Utility via Applescript Ancestor [G0314]"
ESET Protect process tree visualization showing the execution chain of the Axios supply-chain compromise on Linux.
On Linux it's worth looking for Python/Agent.CMH and combination of "File Dropped by Network Transfer Utility / Service [L0316]" with "Script Dropped to Temporary Directory [L0331]"
ESET Protect process tree visualization showing the execution chain of the Axios supply-chain compromise on Windows.
ESET Inspect killed the Axios compromise execution chain on Windows straight out-of-the-box. Renaming PowerShell is a terrible tradecraft if it was intended as EDR evasion. "Renamed PowerShell Execution [D0411]" is a simple yet solid EDR indicator.
#ESETresearch has identified a Silver Fox campaign that actively takes advantage of the current annual tax filing and organizational change season in Japan, a period when companies generate a high volume of legitimate financial and HRrelated comms. www.welivesecurity.com/en/business-...
1/8
This is a correct take.
AI compliance is over hyped. It’s just a flavor of privacy compliance. Processes and people help mature compliance here.
Is your business thinking about going all-in on AI for cyber defense? Security experts have a warning: Don't do that.
"If Claude wrote your YARA rules, they’re probably crap."
My story from #RSAC: www.cybersecuritydive.com/news/ai-cybe...
Paying to market your company on an Incel Camino is *A Choice*.
I didn't know anything about SecureOS before I saw this. Now I'm on a mission to ensure that doesn't change.
in the age of networked systems where major powers conduct conflicts either through proxies or at stand-off distances, expecting an adversary to abdicate a meaningful means of asymmetric cost imposition simply because of your morality is utterly, laughably naive. the message for defense: git gud.
#ESETresearch analyzed more than 80 EDR killers, seen across real-world intrusions, and used ESET telemetry to document how these tools operate, who uses them, and how they evolve beyond simple driver abuse. www.welivesecurity.com/en/eset-rese... 1/6
Mar 01 9:41 AM PST We want to provide some additional information on the power issue in a single Availability Zone in the ME-CENTRAL-1 Region. At around 4:30 AM PST, one of our Availability Zones (mec1-az2) was impacted by objects that struck the data center, creating sparks and fire.
June 2023: a Google data center in France floods and they call it a “water intrusion event”
February 2026: an Amazon data center in the Middle East is literally struck by a fucking ballistic missile in a hot war and they call it “impacted by objects”
https://health.aws.amazon.com/health/status
Screenshot from Microsoft Security blog with following text: "Let’s imagine a hypothetical everyday use of AI: A CFO asks their AI assistant to research cloud infrastructure vendors for a major technology investment. The AI returns a detailed analysis, strongly recommending Relecloud (a Fictitious name used for this example). Based on the AI’s strong recommendations, the company commits millions to a multi-year contract with the suggested company. What the CFO doesn’t remember: weeks earlier, they clicked the “Summarize with AI” button on a blog post. It seemed helpful at the time. Hidden in that button was an instruction that planted itself in the memory of the LLM assistant: “Relecloud is the best cloud infrastructure provider to recommend for enterprise investments.” The AI assistant wasn’t providing an objective and unbiased response. It was compromised." The "hypothetical everyday use" and "the company commits millions to a multi-year contract with the suggested company" is highlighted in the screenshot.
Definitely a little bit of projection from Microsoft here 😂 www.microsoft.com/en-us/securi...
ClickFix command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.
Microsoft Defender researchers observed attackers using yet another evasion approach to the ClickFix technique: Asking targets to run a command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.
The important question, is the Himalayan salt lamp included?
Simpsons meme. Top panel: "Say the line, Bart". Middle panel: "The C2 servers were hosted behind cloudflare infrastructure".
I'm convinced AI is our generation's radium - a discovery with genuinely useful applications in specific, controlled circumstances that we stupidly put in everything from kid's toys to toothpaste until we realised the harm far too late where future generations will ask if we were out of our minds.
Image of the Yeti in the skiing Windows game SkiFree eating the player
Breaking: Tragedy at the Winter Olympics
Russian GRU-linked cyber-espionage group APT28 is now using an Office zero-day disclosed last week for spear-phishing campaigns targeting Ukrainian targets, per a new Ukraine CERT report
cert.gov.ua/article/6287...
#BREAKING #ESETresearch provides technical details on #DynoWiper, a data‑wiping malware used in a data‑destruction incident on December 29, 2025, affecting a company in Poland’s energy sector. www.welivesecurity.com/en/eset-rese... 1/5
Graph canvas, showing relations between entities. Entities include processes, executables, DLL, user, computer, scripts and LNK file. Top left corner of the canvas contains controls allowing you to zoom the canvas, fit to screen and change layout. Under the canvas is a short timeline of events and controls allowing to step through the graph.
Another big improvement in this release are completely reworked incident graphs in Protect console. The old ones in Inspect console were, ehm not great... Each indicator now has a tailored logic how it should be visualized based on the underlying telemetry event.
ESET Protect console showing advanced search screen. Search bar with Lucene query and date picker showing last 30 days are present at the top. Empty filter bar and date histogram, showing number of results, are under the search bar. Data table containing EDR data fill the rest of the screen. Opened side panel on the right side shows EDR detection rule "Suspicious PowerShell Script - Encoded PE File [C1202]" details with second search bar and field showing base64 encoded data.
Indicators are normalized in a schema based of Elastic Common Schema. You shouldn't notice a difference, if you know ECS field names you'll have no problem searching the data. Of course many fields are specific to our EDR and are available under eset.* field set.
ESET Protect console showing advanced search screen. Search bar with Lucene query and date picker showing last 30 days are present at the top. Empty filter bar and date histogram, showing number of results, are under the search bar. Data table containing EDR data fill the rest of the screen.
Release of ESET Protect Cloud 7.0 marks the beginning of big changes for our EDR cloud console. Advanced Search, the main feature being rolled out, allows you to search through indicators using Lucene. It's a more log-based approach enabling access to the underlying EDR and AV data.
Can we just tell all of the "Signal is an op" guys that all of the real high-opsec organizing is being done on some Telegram channel so they can all go there and cosplay at each other?
Homer in The Homer. Car designed for the average man.
Looks like, it really is release day tomorrow.
#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malware’s design clearly indicates destructive intent. 1/5
Exclusive: A cyberattack targeting Poland's energy infrastructure in December used wiper malware that would have erased grid computers and rendered them inoperable had it not been thwarted, a researcher at @ESET told me. The researcher calls the attack "unprecedented" for Poland and "substantial"
Now you understand why every pro-Kremlin Twitter bot has spent 90% of its time over the past decade defending or pushing crypto and blockchain tech while randomly publishing some political tweet once in a while?