{
	"id": "0983eb05-853c-47e5-8bee-6f5342ea2946",
	"created_at": "2026-04-06T00:09:17.288036Z",
	"updated_at": "2026-04-10T03:24:29.11657Z",
	"deleted_at": null,
	"sha1_hash": "0b541fac82a69e00d637a13bbbde4739e19c2176",
	"title": "ESET Blog: Cybersecurity News, Threats \u0026 Tips",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2487616,
	"plain_text": "PREVENTION AND AWARENESS\r\nHow to take legacy\r\noperational technology (OT)\r\nrisks in manufacturing head-on\r\nMárk Szabó • 01 Apr 2026 • 10 min. read\r\nLatest Cybersecurity Articles\r\nhttp://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a\r\nPage 1 of 9\n\nCOMPLIANCE AND REGULATIONS\r\nWhat Common Criteria Certification\r\nmeans for ESET Endpoint Security\r\nWhen it comes to IT security technologies, independent tests and\r\ncertifications help decision-makers assess solutions and evaluate their\r\nperformance.\r\nPREVENTION AND AWARENESS\r\nHow to take legacy operational\r\ntechnology (OT) risks in\r\nmanufacturing head-on\r\nDo you know how to bridge the gap between legacy risks and modern\r\nsecurity needs?\r\nCLOUD AND APPLICATION SECURITY\r\nPhishing is now more dangerous\r\nthan ever. Businesses need new\r\ntools.\r\nESET boosts its Anti-Phishing with detection of malicious QR codes and\r\ncalendar invites.\r\nAndré Lameiras • 02 Apr 2026\r\nMárk Szabó • 01 Apr 2026\r\nRoman Cuprik • 31 Mar 2026\r\nhttp://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a\r\nPage 2 of 9\n\nPRIVACY AND IDENTITY PROTECTION\r\nSextortion explained: How to keep\r\nyourself and your family safe\r\nWe all know not to believe everything we read online. But when an\r\nemail lands in your inbox from someone claiming to have compromiing\r\nimages of you, reason tends to go out of the window.\r\nTHREAT LANDSCAPE\r\nWhy threat intelligence is at the\r\nheart of security integration\r\nSecurity analysts don’t need more noise. They need intelligence that’s fit\r\nfor purpose, integrates, and delivers clarity without friction.\r\nTHREAT INTELLIGENCE\r\nGo beyond reactive cybersecurity,\r\nsharpen your defenses with eCrime\r\nthreat intelligence reports\r\nRansomware groups are growing bolder, and attacks are at record\r\nhighs. Businesses now need threat intelligence to boost traditional\r\ncybersecurity defenses.\r\nPhil Muncaster • 30 Mar 2026\r\nMárk Szabó • 25 Mar 2026\r\nRoman Cuprik • 24 Mar 2026\r\nhttp://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a\r\nPage 3 of 9\n\nCLOUD AND APPLICATION SECURITY, COMPLIANCE\r\nAND REGULATIONS\r\nIn the crosshairs: Securing cloud\r\nworkloads with bespoke solutions\r\nWith regulations like DORA, third-party risk gains new consequences.\r\nTHREAT LANDSCAPE\r\nToo big to ignore? The security crisis\r\nbrewing in AI agent platforms\r\nWhat we found after scanning 60 thousand skills for AI agents, and how\r\nto put guardrails in place.\r\nPRIVACY AND IDENTITY PROTECTION\r\nIs it safe to buy from Shein?\r\nLarge e-commerce platforms and their databases are always popular\r\ntargets for cybercriminals.\r\nMárk Szabó • 23 Mar 2026\r\nESET Research • 20 Mar 2026\r\nBen Tudor • 17 Mar 2026\r\nhttp://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a\r\nPage 4 of 9\n\nPREVENTION AND AWARENESS\r\nStrong enough to lead: Navigating\r\nresilience in IT Security\r\nWhat is core-code for leadership in IT security? Investing in resilience\r\nand trust.\r\nPREVENTION AND AWARENESS\r\nYou’ve got mail: How to secure your\r\nMicrosoft Exchange server\r\nAre email servers doomed to eternal vulnerability? International\r\ncybersecurity partners think otherwise.\r\nPRIVACY AND IDENTITY PROTECTION\r\nHow to remove your personal\r\ninformation from the internet: A\r\nstep-by-step guide\r\nYour digital footprint reveals personal data that puts your security and\r\nprivacy at risk. Here’s how to audit your exposure, remove PII, and stop it\r\nfrom resurfacing.\r\nViktória Ivanová • 16 Mar 2026\r\nMárk Szabó • 11 Mar 2026\r\nPhil Muncaster • 10 Mar 2026\r\n\u003c 1 2 3 4 ... 40 \u003e\r\nhttp://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a\r\nPage 5 of 9\n\nhttp://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a\r\nPage 6 of 9\n\nI am interested in:\r\nLet us keep you\r\nup to date\r\nSign up for our newsletters\r\nEmail Address *\r\nhttp://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a\r\nPage 7 of 9\n\nOur experts ESET\r\nWhat is Privacy Policy\r\nContact us Manage Cookies\r\nLegal Information\r\nFollow us\r\nSweden\r\nSUBSCRIBE\r\nBusiness Topics\r\nHome Topics\r\nCountry *\r\nhttp://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a\r\nPage 8 of 9\n\n© 1992 - 2025 ESET, spol. s r.o. - All rights reserved. Trademarks used therein are\r\ntrademarks or registered trademarks of ESET, spol. s r.o. or ESET North\r\nAmerica. All other names and brands are registered trademarks of their\r\nrespective companies.\r\nhttp://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a\r\nPage 9 of 9\n\nfrom resurfacing. Phil Muncaster • 10 Mar 2026 \n\u003c 1 2 3 4 ... 40 \u003e\n   Page 5 of 9",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"http://blog.eset.com/2012/12/18/malicious-apache-module-used-for-content-injection-linuxchapro-a"
	],
	"report_names": [
		"malicious-apache-module-used-for-content-injection-linuxchapro-a"
	],
	"threat_actors": [
		{
			"id": "d90307b6-14a9-4d0b-9156-89e453d6eb13",
			"created_at": "2022-10-25T16:07:23.773944Z",
			"updated_at": "2026-04-10T02:00:04.746188Z",
			"deleted_at": null,
			"main_name": "Lead",
			"aliases": [
				"Casper",
				"TG-3279"
			],
			"source_name": "ETDA:Lead",
			"tools": [
				"Agentemis",
				"BleDoor",
				"Cobalt Strike",
				"CobaltStrike",
				"RbDoor",
				"RibDoor",
				"Winnti",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "aa73cd6a-868c-4ae4-a5b2-7cb2c5ad1e9d",
			"created_at": "2022-10-25T16:07:24.139848Z",
			"updated_at": "2026-04-10T02:00:04.878798Z",
			"deleted_at": null,
			"main_name": "Safe",
			"aliases": [],
			"source_name": "ETDA:Safe",
			"tools": [
				"DebugView",
				"LZ77",
				"OpenDoc",
				"SafeDisk",
				"TypeConfig",
				"UPXShell",
				"UsbDoc",
				"UsbExe"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434157,
	"ts_updated_at": 1775791469,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0b541fac82a69e00d637a13bbbde4739e19c2176.pdf",
		"text": "https://archive.orkl.eu/0b541fac82a69e00d637a13bbbde4739e19c2176.txt",
		"img": "https://archive.orkl.eu/0b541fac82a69e00d637a13bbbde4739e19c2176.jpg"
	}
}