【資安快訊】Lazarus 目標鎖定無人機產業

ESET 研究人員近期發現了一起新的「夢想職業行動」(Operation DreamJob)攻擊事件。這項行動由與北韓結盟的拉撒路組織(Lazarus)發起,我們一直追蹤這項行動。此次攻擊的目標包括多家活躍於國防工業的歐洲公司。其中一些公司涵蓋無人機(UAV)領域,這表明此次行動可能與北韓目前擴大其無人機計畫規模有關。

Lazarus與Operation DreamJob簡介
Lazarus策劃了多起備受矚目的網路攻擊事件,其中以2017的WannaCry勒索軟體攻擊讓大家記憶猶新,同時該組織也從事網路間諜、網路破壞等多項網路犯罪活動。
而「夢想工作行動」(Operation DreamJob)該行動主要依賴社交攻擊,特別是利用虛假的、高聲望或高曝光度的職位應徵資訊當誘餌。
自 2025 年 3 月下旬起,我們在 ESET 遙測資料中觀察到與「夢想就業行動」(Operation DreamJob)類似的網路攻擊。這些實際發生的攻擊先後針對三家活躍於國防領域的歐洲公司。儘管它們的業務範圍略有不同,但可以概括為:金屬工程公司(東南歐)、飛機零件製造商(中歐)以及國防公司(中歐)
綜上所述,我們高度確信此活動與Lazarus有關,特別是與其「夢想職業行動」相關的活動,理由如下:
• 最初是透過社交工程手段獲取存取權限,誘使目標執行偽裝成職位描述的惡意軟體,以成功通過招募流程。
• 對開源專案進行木馬化,然後修改其內容生成DLL injection,這似乎是「夢想作業行動」特有的方法。
• 後續階段利用惡意程式ScoringMathTea,過去曾被發現用於多次類似的攻擊。
• 目標鎖定產業位於歐洲,與先前「夢想就業行動」相同的目標產業(航空航太、國防、工程)一致。
近三年來,Lazarus 組織維持一貫的攻擊手法,部署其首選的惡意程式ScoringMathTea,採用植入開源應用程式內進行隱匿。雖可預測但其多樣性使其能夠逃避安全偵測,但不足以掩蓋其組織的真實身分和溯源。此外,儘管媒體對「夢想就業行動」(Operation DreamJob)及其社交工程攻擊手段進行了廣泛報導,但大部分員工在社交工程的意識不足下,還是無法應對這一類可疑招聘流程可能帶來的風險。
為解決這一類社交工程攻擊手法,ESET提供了ESET Cybersecurity Awareness,人為因素是資安攻擊中最被廣為利用的手法,但透過完整的培訓也很容易解決這個問題。透過ESET Cybersecurity Awareness讓資訊/資安人員投入相對較少的精力,就能讓企業將資訊安全重心轉移到更應該優先完成的企業防護策略上,進而減少企業損失。


原文出處:
Gotta fly:Lazarus targets the UAV sector https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/ 
Cyber awareness training: How to improve your cyber resilience with a few clicks https://www.eset.com/blog/en/business-topics/prevention-and-awareness/cyber-awareness-training/


關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟體提供商,其 獲獎產品——NOD32防病毒軟體系統,能夠針對各種已知或未知病毒、間諜軟體 (spyware)、rootkits和其他惡意軟體為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲 得了更多的Virus Bulletin 100%獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳 能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布里斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事 處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

【資安快訊】ESET Research 發現第一個已知的人工智慧勒索軟體

ESET Research 已聯繫一項學術研究的作者,該研究名為《勒索軟體 3.0:自我創作和 LLM-Orchestrated》,其研究原型與在 VirusTotal 上發現的 PromptLock 樣本非常相似。
這進一步印證了我們的信念:PromptLock
只是概念驗證,而是有可能發生的惡意軟體。即便如此,我們的發現仍然站得住腳–這些發現的樣本代表了已知的首例 AI 驅動的勒索軟體案例。
勒索軟體 3.0 代表了 LLM 編排的勒索軟體的第一個威脅模型和研究原型。與傳統惡意軟體不同,此原型僅需要在二進位檔案中嵌入自然語言提示;惡意程式碼由 LLM 在執行時間動態合成,從而產生適應執行環境的多態變體。該系統在無需人工參與的閉環攻擊活動中執行偵察、有效載荷生成和個性化勒索。

ESET 研究人員發現了第一個已知的 AI 驅動勒索軟體。該惡意軟體被 ESET 命名為 PromptLock,能夠竊取、加密甚至銷毀數據,但銷毀功能似乎尚未在惡意軟體中實現。
雖然 PromptLock 並未在實際攻擊中被發現,而是被認為是一個概念驗證 (PoC) 或正在進行的工作,但 ESET 的發現表明,惡意使用公開可用的 AI 工具可能會增強勒索軟體和其他普遍存在的網路威脅。

PromptLock 惡意軟體透過 Ollama API 在本地使用 OpenAI 的 gpt-oss-20b 模型,動態產生並執行惡意 Lua 腳本。 PromptLock 利用硬編碼提示產生的 Lua 腳本列舉本機檔案系統、檢查目標檔案、竊取選取資料並執行加密。ESET 研究人員說。

研究人員補充說:「PromptLock 勒索軟體是用 Golang 編寫的,我們已經識別出已上傳到 VirusTotal 的 Windows 和 Linux 變種。」Golang 是一種高度通用的跨平台程式語言,近年來在惡意軟體編寫者中也越來越受歡迎。

影響層面
人工智慧模型讓製作令人信服的網路釣魚資訊以及深度偽造圖像音訊視訊變得輕而易舉。這些工具的隨時可用也大大降低了技術水平較低的攻擊者的進入門檻,使他們能夠發動超乎尋常的攻擊。
同時,多年來,勒索軟體的肆虐考驗著無數組織的網路防禦能力, APT 組織也越來越多地部署此類惡意軟體。由於各類威脅行為者都不同程度地使用了人工智慧,因此它也將進一步增強勒索軟體攻擊的數量和影響力。
無論PromptLock背後的意圖如何,它的發現都表明,人工智慧工具可以自動化勒索軟體攻擊的各個階段,從偵察到資料洩露,其速度和規模一度被認為是不可能實現的。人工智慧驅動的惡意軟體能夠適應環境並隨時調整策略,這種前景或許代表著網路攻擊的新前線。

原文出處:

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟體提供商,其 獲獎產品——NOD32防病毒軟體系統,能夠針對各種已知或未知病毒、間諜軟體 (spyware)、rootkits和其他惡意軟體為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲 得了更多的Virus Bulletin 100%獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳 能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布里斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事 處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

【ESET產品 114年第四次電腦軟體共同供應契約採購(1140204)】 決標公告

「114年第四次電腦軟體共同供應契約採購(1140204)
已於114年10月3日完成品項之決標作業,
並已於政府電子採購網上架決標品項供各適用機關進行採購,
相關決標資訊詳情請參考政府電子採購網:http://web.pcc.gov.tw/pishtml/pisindex.html

組別
項次
品項名稱
單套授權數
級距
12
38
ESET PROTECT ENTRY On-Prem 標準版集中管理授權解決方案(一年訂閱授權)
1
5-10000


感謝各位對ESET系列產品的支持與愛護,
若有問題歡迎來電洽詢ESET業務部門(02)7722-6899,或來信至:
enterprise@version-2.com.tw
*政府標案合作廠商: https://version-2.com.tw/%e6%94%bf%e5%ba%9c%e6%a8%99%e6%a1%88/
*經濟部工業局軟體採購辦公室: https://www.spo.org.tw/office_new3/
*政府電子採購網: http://web.pcc.gov.tw/pishtml/pisindex.html

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟體提供商,其 獲獎產品——NOD32防病毒軟體系統,能夠針對各種已知或未知病毒、間諜軟體 (spyware)、rootkits和其他惡意軟體為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲 得了更多的Virus Bulletin 100%獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳 能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布里斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事 處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

【資安快訊】Storm-0501駭客轉向雲端勒索,利用管理員帳號直接刪除備份與外洩資料

Storm-0501 是一個從 2021 年起活躍的駭客集團,最早透過傳統勒索軟體加密受害者電腦中的檔案來索取贖金,但近期他們已經把目標轉向雲端,利用雲端本身的功能來達成同樣的目的。這意味著他們不再需要部署惡意程式,只要奪取雲端管理員的身分,就能直接刪除備份、外洩資料,讓受害者陷入無法復原的困境。

他們的攻擊流程通常先從滲透 Active Directory 開始,逐步取得更高層級的權限,接著利用同步帳號進入 Azure 或 Entra ID,趁缺乏多重驗證的弱點重設密碼並接管全域管理員。為了確保長期存取,他們還會建立惡意的「聯盟域」,以此繞過正常的驗證機制,隨時都能進入受害者的雲端環境。

當掌控權力到手後,他們會快速外洩敏感資料並刪除或公開儲存帳戶,連備份也一併清除,最後再透過受害者自己的 Teams 帳號或其他管道發出勒索要求。這種模式比傳統勒索更有效率,也更難偵測。對企業來說,這代表單靠傳統防禦已不足以應對,必須強化雲端帳號的安全措施,例如啟用多重驗證、加強監控以及確保備份不會被輕易刪除。

資安建議 :
1. 加強雲端環境的安全監控
Guardz 包含多種安全模組,如:
– ITDR(身份威脅偵測與回應)
– 雲端資料保護及 DLP(資料外洩防護)
– 掃描外部攻擊面與洩露憑證

2. 強化身分驗證與權限管理
使用segura
特權帳號集中管控與隱匿:管理員憑證不會直接暴露在 AD 或伺服器上,而是由 segura 的安全金庫動態發放與回收,駭客即使滲透 AD 也難以直接取得密碼。
憑證與密碼集中保管:所有特權帳號的密碼、金鑰不會散落在伺服器或同步帳號上,而是放在加密保護的保管庫(vault)裡,駭客即使滲透進去,也不容易直接抓到明文憑證。

3. 備份與資料保護
Keepit雲端 SaaS 備份與資料保護平台
不可變(Immutable)備份
Keepit 的備份存放在自家獨立的雲基礎設施中,不依附於 Microsoft 365、Google Workspace、Salesforce 等原服務,因此駭客即使拿到雲端管理員帳號,也無法刪除或修改這些備份。
抗勒索與資料外洩勒索
即便攻擊者像 Storm-0501 那樣刪掉雲端儲存帳戶或備份,Keepit 的獨立平台仍能還原,避免企業完全被勒索綁架。

原文出處:https://www.bleepingcomputer.com/news/security/storm-0501-hackers-shift-to-ransomware-attacks-in-the-cloud/

【資安快訊】SharePoint漏洞造成美國國家機構資安危機

零日攻擊蔓延,資安防線備受考驗
隨著全球企業與政府組織高度仰賴數位協作平台,像是 Microsoft SharePoint 等企業核心應用已成為現代辦公生態的基石。然而,這類系統一旦出現「零日漏洞」(Zero-Day Vulnerability),其所引發的連鎖風險可能遠超預期。

【事件背景】
2025 年 7 月,微軟(Microsoft)爆出重大資安事件,旗下 SharePoint Server 被揭露存在兩個零日漏洞(CVE-2025-53770 與 CVE-2025-53771),並已遭具有中國背景的駭客組織利用,成功入侵美國國家機構等等關鍵機構。
根據報導,他們運用一種名為「ToolShell」的惡意工具鏈攻擊 SharePoint Server 並取得內部系統的長期存取權限。駭客可藉此取得敏感文件、部署後門程式,甚至建立C2通道進行橫向滲透。

【實際影響與已知攻擊】
本次事件最具爭議的是攻擊波及美國國家核子安全局(NNSA)與能源部等關鍵基礎設施機構。報導指出,駭客成功竊取部分機密檔案,部分尚未判定是否與核能或武器計畫相關。
根據微軟後續調查與 Microsoft Threat Intelligence 的說明,該攻擊並非大規模入侵,而是經由極具針對性的攻擊所造成。攻擊者極可能先入侵某個合作廠商帳號,再借此進入內部網路。
事件揭露後,美國政府要求所有 SharePoint 使用單位緊急評估環境風險,並在 72 小時內完成修補作業。微軟亦已於 7 月 19 日發布修補更新,並建議未能及時修補的用戶應立刻停用對外連接埠。

【資安啟示與因應建議】
1. 零信任不再是選項,而是基本生存機制
此次事件再度證明傳統網路邊界概念已經失效。即便是政府單位與企業資安團隊,也必須全面導入零信任架構(Zero Trust Architecture, ZTA),透過持續驗證、動態資源存取控管,以及使用者行為分析來降低橫向移動的可能性。


2. 第三方服務與帳號監控是防線破口
若攻擊是從外部供應鏈起始,則加強合作廠商、承包商與跨部門帳號存取權限的控管就更為重要。建議導入整合型 IAM(Identity and Access Management)與供應鏈資安風險評估流程。


3. 提早導入威脅情報與自動化修補
企業可以透過訂閱 CVE Feed等資訊與建置資安情資(開源/商業)平台,並強化漏洞評估與改進企業內部通報機制,經由完整SOP讓資安團隊能有更快的應變。

本次 SharePoint 零日攻擊事件,從國家級駭客組織精準的入侵路徑、微軟產品安全機制的缺失,再到政府單位應變節奏,每一個環節都透露出我們在面對深度複雜威脅時的脆弱。做為資安從業人員,這不僅是一場攻防演練的案例,更是一份對未來網路戰爭(Cyberwarfare)的警訊。

原文出處:
1. Segura® 官方網站 https://segura.security/segura-v4
2. US agency overseeing nuclear weapons breached in Microsoft SharePoint attack https://www.windowscentral.com/microsoft/us-agency-overseeing-nuclear-weapons-breached-in-microsoft-sharepoint-attack?utm_source=chatgpt.com

 

【資安快訊】65台Exchange Server遭駭客入侵並植入鍵盤側錄程式,企圖竊取使用者帳號與密碼資訊

資安公司 Positive Technologies 發現,駭客針對全球至少 65 台 Microsoft Exchange Server 展開攻擊,並成功在 Outlook Web Access(OWA)登入頁植入鍵盤側錄工具(Keylogger),試圖竊取使用者帳號密碼。此次攻擊已持續超過一年,受害範圍涵蓋 26 個國家,其中以越南、俄羅斯與台灣最為嚴重,受害單位包括政府機關、IT 公司、工業與物流業者。
攻擊者透過將惡意 JavaScript 程式碼注入至 OWA 頁面,例如登入按鈕元件,偽裝成正常操作邏輯,誘使使用者在登入時不自覺將帳密資料送出。被側錄的資料會儲存在 Exchange 主機本地特定路徑,或傳送至駭客控制的遠端伺服器。這類攻擊多利用已知但未修補的 Exchange Server 漏洞,包括 CVE-2021-34473、CVE-2021-31207 等,顯示許多組織未定期維護更新系統。
為降低風險,資安專家建議立即修補 Exchange 系統已知漏洞、啟用 MFA 強化登入驗證,並透過網站內容安全政策(CSP)等方式防範惡意程式碼注入。同時,應定期稽核登入頁面完整性,監控可疑的外部請求與異常登入行為,避免帳密資料在未察覺下遭到竊取。此次事件再次凸顯即便是內部應用入口,如 OWA,也可能成為駭客入侵與竊資的破口,企業應全面審視並強化資安防線。
強化漏洞管理與修補機制,避免成為攻擊跳板。

資安建議:
1. 立即修補漏洞:儘速安裝所有已知 Exchange Server 安全更新(特別是 CVE-2021-34473、CVE-2021-31207 等關鍵漏洞)。
Atera/IT服務管理解決方案 】 提供的遠端管理平台包括漏洞管理與修補功能,可以自動化修補過程以及進行漏洞掃描,對於中小型企業來說是個便捷的選擇。
2. 導入 WAF 或反惡意行為代理
Penta Security WAPPLES/WAAP安全解決方案】企業級 Web 應用程式防火牆(WAF),透過行為分析與規則比對技術,辨識並阻擋各種 Web 層攻擊,確保網站與 API 的安全性與合規性。
3. 偵測並阻擋可疑注入或鍵盤側錄活動的 HTTP 流量。
ESET /企業資安解決方案】ESET Mail Security 是 ESET 專為 Microsoft Exchange Server、IBM Domino 及 Linux 郵件伺服器 所設計的 電子郵件防護解決方案。ESET Endpoint Security 啟用瀏覽器防護、加密的記憶體防護、鍵盤防護。

原文出處:【iThome新聞】65臺Exchange Server遭鎖定,駭客埋入鍵盤側錄工具,企圖挖掘用戶帳密資料

 

On a roll in Vegas? Don’t blow it – keep your digital guard up

 

Gamblers and dealers beware; whether in Vegas or Monte Carlo, it’s not strictly your wallet that’s at risk of running on empty.

What do gamblers, casinos, and the FBI have in common? If your answer is money, then try again. The digital age has arrived at brick-and-mortar casinos around the world, bringing with it its own flavor, including malice of a different kind than traditional card counters or chip dumping.

It’s true that casinos are highly regulated and well-protected against fraud of many kinds (often resembling or surpassing the security at hospitals and airports), but these days, it’s cybercriminals who have their eyes set on the grand prize. Casinos bank more than just their guests’ stakes. It’s the sensitive data they keep, such as financial records, personal details, and more, that make up the jackpot nowadays.

With ESET World 2025 taking place in the city of “lost wages” from March 24, 2025, perhaps it’s a good opportunity to raise cyber awareness in an area that might not be so obvious, as, increasingly, it is the data of the city’s guests, rather than the vaults, feed tables, and slot machines, that criminals are interested in.

The table is set

The city of Las Vegas has many nicknames. Also known as the “gambling capital of the world,” the city is known for its lustrous casinos, luxurious hotels, and, of course, games. Within every casino, virtually hundreds of thousands of US dollars get exchanged daily. In 2023, this accounted for a collective $66.5 billion in casino revenue.

Not even George Clooney’s Ocean’s Eleven character, Danny Ocean, would scoff at such an amount, but even he would be shocked at the idea that there is more to a casino than the contents of its vaults.

Beyond the billions is the valuable data of a casino’s clientele, from people searching for lodging to event organizers, or regular, everyday casino-goers. From an even broader perspective, data on business partners (supply chains that provide the machines and security systems), employees, and even the top managers themselves, would be of great interest.

Place your bets

Why is all of this so interesting to threat actors? Let’s start with the sensitive data, like personal information. Anyone who’s ever checked in at a hotel knows the sort of details they have to provide to be given their rooms, such as:

  1. Some form of an ID (state IDs, drivers’ licenses, passports, etc.)
  2. Their name, address, preferences, email
  3. Payment details

On top of that could be other specifics, such as further personal data (companions, dietary restrictions, accessibility requirements) or more. This much granular data can be very valuable on the black market, with stolen personal data from documents such as IDs or passports costing from hundreds to thousands of dollars per document.

Thus, threat actors roll the dice. In 2023, it came to light that the prominent casino chain MGM Resorts was targeted by a cyberattack, with hackers exfiltrating data such as names, contact information, gender, date of birth, IDs, and even Social Security numbers. The attack reportedly cost the chain around $100 million … certainly not chump change.

High rollers have a role

So, who’s responsible for the cybersecurity of the casino’s guests? From one point of view, it is the establishment itself, since, as it is providing a service, it needs to cover any liabilities. This is supported by regulations and guidelines recommending tight security, especially for sensitive data. Just off the top, PCI DSS would cover payment data, while the NIST Cybersecurity Framework would help a casino/hotel of any size to enact appropriate cyber measures.

For casinos in Las Vegas, the Nevada Gaming Commission (NGC) has a clear set of cybersecurity regulations for gaming operators to follow.

Perhaps this also places a bit too much of a burden on these places of entertainment. And, while guests don’t want such thoughts on their minds while hitting the jackpot, the reality is that personal awareness plays a big role when all the chips are down. Otherwise, man-in-the-middle attacks, in which cybercriminals create functional, but fake, Wi-Fi access points (aka “evil twin” networks), can gather sensitive data from victims’ devices.

Don’t bet the farm!

There are threats aplenty in the world of casinos. Scams with fake ads copying a well-known casino’s brand can present promising online gambling opportunities with great welcome bonuses. In fact, some of these scams use unauthorized photos of employees and properties to appear legitimate. What’s more, by pretending to be casino staff, bad actors could try to social engineer their way toward sensitive data, or even gain access to a casino’s systems.

Ace in the hole

What both casino operators and guests have in common is an understanding that stacking the deck in their favor is important. To double down on their security, they should consider:

  • Prevention-first security: Simple antiviruses aren’t enough to protect the myriad devices casinos, hotels, or their guests have. Also, as various IoT vulnerabilities and supply-chain breaches enter the mix, these businesses and consumers must be on a proactive lookout. Businesses should consider investing in a platform such as ESET PROTECT Elite, which can provide all-encompassing protection with vulnerability management and advanced threat defense.
  • Active threat hunting: For those casinos that lack the right IT staff, it would be wise to invest in a managed security service, such as ESET PROTECT MDR Ultimate, which, on top of product security, also adds highly tailored 24/7 protection with experts acting as your wild card against would-be malice, ensuring business continuity.
  • Security audits: This is especially useful for protecting against supply-chain threats. A security audit could highlight weaknesses in casino systems, enabling the defenders to patch them up on time.
  • Zero-trust: Access management methods such as zero-trust can ensure proper controls to mitigate the chances of unverified access. For employees, having a solution capable of Secure Authentication is one way to achieve this.
  • Integrate: Casinos with existing security solutions should consider diversifying their existing security stacks with additional solutions such as Threat Intelligence. Consider that the more details that are available to an operation, the better and faster their decisions could be, saving a business millions in minutes.
  • Mobile Security: Visitors to Vegas are very likely to be on the move. Hopping on and off various networks, trying out new apps, and signing up to promotions for discounts all get safer with a security solution like ESET Mobile Security, which offers protection from viruses, ransomware, and other malware. Prevention First helps you stay safe, evade phishing scams, shop safely, browse, and download files.

Incidentally, advice like this will be discussed at ESET World 2025, at the Aria Resort & Casino in Las Vegas, where experts from all around the globe, from businesses, to analysts, to government actors, will present a path to achieving a secure future. Vegas will be the place to see where progress is protected, and to connect with CISOs, renowned threat hunters, and cybersecurity experts advising CISA, NATO, and Interpol.

Jackpot

There’s no reason not to implement powerful security measures to deter malicious actors from swooping in on one’s turf. This means that casinos, resorts, hotels, and even their guests, should realize that it’s not just everyone’s money they’re after – there are far more compelling reasons to be targeted.

 

ESET’s Ryan Grant Named a CRN® Channel Chief for Third Year in a Row

 

SAN DIEGO, Calif., Feb. 19, 2025ESET, a global leader in cybersecurity, today announced that CRN®, a brand of The Channel Company, has named Ryan Grant, Senior Vice President of Sales and Marketing, to its 2025 CRN® Channel Chiefs list. This list recognizes the executives who are driving strategy, setting the channel agenda for their companies and working tirelessly to ensure mutual success with their partners and customers. 2025 marks the third year in a row that Grant has been named a Channel Chief.

Since joining ESET North America in 2021, Grant has been instrumental to the transformation and success of the company’s channel business. Grant oversees ESET’s U.S. & Canada sales and marketing teams, including enterprise, distribution, managed service provider (MSP), national service provider (NSP), value added reseller (VAR), and retailer segments.  He is also committed to providing more dynamic opportunities for ESET’s channel partners through innovative campaigns and go-to-market programs by working closely with the company’s events, marketing and public relations teams.

“I’m honored to be recognized by CRN alongside so many outstanding leaders from the channel community,” said Grant. “At ESET, we remain committed to empowering our partners with cutting-edge cybersecurity solutions, technical expertise, and tailored support to help them navigate an increasingly complex threat and regulatory landscape. As a channel-first company, we view partner success as our success, so it’s critical that we empower partners with threat intelligence, resources and support that ensures they can quickly capitalize on new market opportunities and deliver exceptional protection to customers.”

The 2025 CRN Channel Chiefs were selected by CRN’s editorial staff based on their proven record of strategic innovation and dedication to the channel community. Under Grant’s direction, ESET has continued to refine its partner program and develop innovative technologies, processes and merchandising strategies. In 2024, the company focused on streamlining order processing, expanding its presence in the cyber risk insurance market and developing a unified API gateway, ESET Connect to empower partners with a catalogue of best-in-class integration partners. ESET also launched AI Advisor, which provides businesses with SOC-level advisory and enabling enhanced security analyst workflows. Unlike other vendor offerings and typical generative AI assistants that focus on soft features like administration or device management, ESET AI Advisor seamlessly integrates into the day-to-day operations of security analysts. This is a gamechanger for companies with limited IT resources who want to utilize the advantages of advanced XDR solutions and threat intelligence feeds.

Grant added, “As cyber threats grow more advanced and adversaries exploit generative AI, it’s crucial for our channel partners to adopt a robust security portfolio that reduces risk for their business customers. ESET stands out with a prevention-first strategy, leveraging AI and human expertise—backed by a world-class R&D team and industry-renowned researchers.”

“This year’s honorees exemplify dedication, innovation, and leadership that supports solution provider success and fosters growth across the channel,” said Jennifer Follett, VP, U.S. Content, and Executive Editor, CRN, at The Channel Company. “Each of these exceptional leaders has made a lasting channel impact by championing partnerships and designing creative strategies that get results. They’ve set a high bar in the channel, and we’re thrilled to recognize their standout achievements.”

CRN’s 2025 Channel Chiefs list is featured in the February 2025 print issue of CRN® Magazine and online at www.CRN.com/ChannelChiefs.

To learn more about ESET’s partner program, visit https://www.eset.com/us/partnernow/.

ESET Corporate Solutions brings new CCSO leadership

 

Bratislava – February 4, 2025 ESET, a global leader in cybersecurity, today announces its new chief corporate solutions officer (CCSO), Martin Talian, whose mandate is to drive growth in delivering bespoke ESET solutions and customer success.

Mr. Talian moves from his position as VP of corporate solutions at ESET, bringing 18 years of leadership experience across diverse industry verticals to his new role. With an enduring focus on delivering value to large organizations and leadership roles with utilities, large infrastructure companies, telecommunications, digitalization, banking, and now cybersecurity, Mr. Talian is well-positioned to accelerate growth in the ESET Corporate Solutions Division.

With globally relevant expertise and demonstrable project completion, Martin Talian is set to draw from the expansive ESET portfolio of technologies, products, and services. Utilizing his rich experiences, he is poised both to create and to deliver new custom security offerings.

“Martin has been a key engine for both success and growth in the Corporate Solutions Division at ESET since its launch in 2022. He brings a passion to closing deals and delivering value to high-touch customers, and his aptitude aligns with our need both to showcase our talents and to scale our offerings. I look forward to the continued success and the fresh perspective our new C-Level manager will bring to ESET,” said Richard Marko, chief executive officer at ESET.
With large deals closing in connection with ESET NetProtect in both the EU and the Asia Pacific region, Talian’s leadership has already been recognized. These successes reflect his achievements in building and managing Solution Delivery teams, his oversight of critical sales team maturation and management processes, and his command of both the go-to-market strategy and accounts management protocols needed to succeed globally, including in North America, Latin America the Middle East and Africa.

“I am grateful for the opportunity to lead this unique team, one that I had a direct hand in building, and one which can support the wider organization in its bid to raise the prominence of ESET globally,” said Talian.

Martin Talian joins ESET’s other C-Level business leaders: CEO Richard Marko, CBO Pavol Balaj, CMO Mária Trnková, and CSO Miroslav Mikuš.

 

 

ESET Launches New Series of Speakeasy Security, a Tech and Cybersecurity Podcast

 

Tony Anscombe, ESET Chief Evangelist Adds Kirsten Bay, Cysurance CEO as Co-Host

SAN DIEGO, Calif., January 28, 2024ESET, a global leader in cybersecurity and threat detection, today announced a new series of its cybersecurity podcast, Speakeasy Security. As part of a 10-episode series, Speakeasy Security will be co-hosted by ESET Chief Security Evangelist Tony Anscombe and Co-Founder and CEO of Cysurance Kirsten Bay – providing lively commentary on the latest tech, privacy and cybersecurity headlines and offering listeners tips to protect themselves from cybercriminals.

Available on a range of popular podcast platforms, including Apple Podcasts, Spotify, Amazon Music, Podcast Index, iHeart Radio, Pocket Casts, Deezer, Podcast Addict, Listen Notes and Podchaser, the first episode will air on “Trust in Technology—AI and Driverless Cars” where Anscombe and Bay discuss the public’s embrace and skepticism towards the technology.

“I’m excited to have Kirsten join me at Speakeasy Security – delivering a fresh perspective from her years working to help consumers, SMBs and enterprises manage cybersecurity risk,” said Tony Anscombe. “Each episode, Kirsten and I will explore how new technologies and AI advancements are impacting our personal and professional lives, and the cybersecurity and privacy implications. We will aim to make complex tech issues understandable and enjoyable, while offering practical tips and advice for both businesses and consumers.”

Bay, Co-Founder and CEO of Cysurance, is a sought-after public speaker and respected leader in the cyber insurance industry. She brings 25 years of expertise in financial services, risk intelligence and cybersecurity to the podcast in her role as co-host. Anscombe is a 30-plus year security industry expert and established author, blogger and speaker on new policies, regulations and the cybersecurity threat landscape. Speakeasy Security will also continue to feature ESET’s leading researchers and threat detection experts, as well as recognized cybersecurity influencers and guests from across the tech universe.

“I am thrilled to join Speakeasy Security as a co-host and to explore how new technologies, smart devices and privacy-focused legislations will impact society and everyday users,” said Kirsten Bay, Co-Founder and CEO of Cysurance. “My goal with Tony is to offer thought-provoking insights and practical advice to help our audience navigate and stay secure in an ever-evolving digital landscape.”

Speakeasy Security adds to ESET’s body of original content, which includes its award-winning blog WeLiveSecurity. Featuring commentary from ESET’s global security researchers, WeLiveSecurity offers in-depth knowledge of the latest threats and security trends, views and insights, video tutorials and advice for everyday internet users on how to secure data effectively. Follow the blog on Twitter at @welivesecurity and follow Anscombe at @TonyAtESET and Bay at @cyberkbay.

For more information on Speakeasy Security, visit https://www.eset.com/us/about/newsroom/podcast-list/