Tag ESET

Polish Grid Hack Highlights Europe’s Urgent Need for Active Defense Strategies

Critical Infrastructure Security, Geo-Specific Russian Cyberattack Highlights Vulnerabilities in Europe’s Infrastructure David Meyer • January 30, 2026 Image: AustralianCamera/Shutterstock A significant cyberattack on Poland’s energy grid, reportedly orchestrated by Russian hackers, has raised urgent calls for enhanced cybersecurity measures across Europe. Experts emphasize the need for active defense strategies and…

Read MorePolish Grid Hack Highlights Europe’s Urgent Need for Active Defense Strategies

Wiper Malware Aimed at Poland’s Power Grid Linked to Moscow

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Indicators Reveal Prolonged Engagement by ‘Sandworm’ Military Intelligence Hackers Mathew J. Schwartz (euroinfosec) • January 26, 2026 Polish Prime Minister Donald Tusk speaks at a press conference on January 15, detailing Russian cyberattacks on Poland’s power grid in late 2025. (Image: Polish…

Read MoreWiper Malware Aimed at Poland’s Power Grid Linked to Moscow

Poland’s Energy Grid Hit by Unprecedented Wiper Malware Attack

Poland’s Electric Grid Targeted by Russian Wiper Malware: Analysis of Recent Cyberattack On January 13, researchers announced that Poland’s electric grid had been the target of a cyberattack involving wiper malware, with strong indications that the origin of this attack aligns with Russian state-sponsored hackers. This malicious software aims to…

Read MorePoland’s Energy Grid Hit by Unprecedented Wiper Malware Attack

Cybersecurity Researchers Discover First Known UEFI Rootkit in the Wild

ESET cybersecurity researchers have reported the emergence of what they are calling the first UEFI rootkit actively utilized in the field. This advanced malware permits attackers to embed persistent malicious software within targeted devices, enabling it to withstand complete hard-drive formatting, which poses significant implications for affected organizations. The malware,…

Read MoreCybersecurity Researchers Discover First Known UEFI Rootkit in the Wild

Four Hacker Groups Exploit Zero-Day Vulnerability in Zimbra Email Software

Zero-Day Vulnerability in Zimbra Email Software Exploited by Multiple Threat Actors A recently identified zero-day vulnerability in the Zimbra Collaboration email software has been exploited by four distinct groups to compromise sensitive email data, user credentials, and authentication tokens. This flaw, designated as CVE-2023-37580, has garnered attention due to its…

Read MoreFour Hacker Groups Exploit Zero-Day Vulnerability in Zimbra Email Software

New ComRAT Malware Leverages Gmail for Command Reception and Data Exfiltration

Recent cybersecurity investigations have revealed an upgraded variant of the ComRAT backdoor, a sophisticated tool initially deployed by the Turla Advanced Persistent Threat (APT) group. This latest iteration utilizes Gmail’s web interface to clandestinely receive commands and exfiltrate sensitive information. Cybersecurity firm ESET reported that ComRAT version 4, first identified…

Read MoreNew ComRAT Malware Leverages Gmail for Command Reception and Data Exfiltration

Hackers Impersonate HR Professionals to Target Military and Aerospace Personnel with Fake Job Offers

Targeted Cyber-Espionage Campaign Hits Aerospace and Military Sectors Cybersecurity researchers have unveiled a sophisticated cyber-espionage campaign that specifically targets aerospace and military organizations across Europe and the Middle East. This initiative, termed “Operation In(ter)ception,” reportedly aimed to infiltrate and monitor key personnel within these firms while also attempting to extract…

Read MoreHackers Impersonate HR Professionals to Target Military and Aerospace Personnel with Fake Job Offers

A Google Drive Vulnerability Could Enable Attackers to Coerce You into Installing Malware

A recently uncovered vulnerability in Google Drive presents a significant risk, potentially allowing cybercriminals to distribute malware disguised as legitimate files. This largely unaddressed security oversight enables attackers to leverage Google Drive’s file version management feature, resulting in higher success rates for spear-phishing schemes. The flaw, which Google is reportedly…

Read MoreA Google Drive Vulnerability Could Enable Attackers to Coerce You into Installing Malware