Latest Articles

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper

ESET Research23 Jan 2026


Children and chatbots: What parents should know

Children and chatbots: What parents should know

Children and chatbots: What parents should know

As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development

Phil Muncaster23 Jan 2026


Common Apple Pay scams, and how to stay safe

Common Apple Pay scams, and how to stay safe

Common Apple Pay scams, and how to stay safe

Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead

Phil Muncaster22 Jan 2026


Old habits die hard: 2025’s most common passwords were as predictable as ever

Old habits die hard: 2025’s most common passwords were as predictable as ever

Old habits die hard: 2025’s most common passwords were as predictable as ever

Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well

Christian Ali Bravo20 Jan 2026


Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.

Phil Muncaster16 Jan 2026


Is it time for internet services to adopt identity verification?

Is it time for internet services to adopt identity verification?

Is it time for internet services to adopt identity verification?

Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.

Tony Anscombe14 Jan 2026


Your personal information is on the dark web. What happens next?

Your personal information is on the dark web. What happens next?

Your personal information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.

Phil Muncaster13 Jan 2026


Credential stuffing: What it is and how to protect yourself

Credential stuffing: What it is and how to protect yourself

Credential stuffing: What it is and how to protect yourself

Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts

Christian Ali Bravo08 Jan 2026


This month in security with Tony Anscombe – December 2025 edition

This month in security with Tony Anscombe – December 2025 edition

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year

Editor29 Dec 2025


A brush with online fraud: What are brushing scams and how do I stay safe?

A brush with online fraud: What are brushing scams and how do I stay safe?

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.

Phil Muncaster23 Dec 2025


Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation

Romain Dumont22 Dec 2025


LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions

Anton Cherepanov and Peter Strýček18 Dec 2025


Apt Activity Report
MDR Protection