Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible
Matthieu Faou • 25 Oct 2023
Digital Security
One login to rule them all: Should you sign in with Google or Facebook on other websites?
Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. What’s the trade-off?
André Lameiras • 23 Oct 2023
Video
Spearphishing targets in Latin America – Week in security with Tony Anscombe
ESET's analysis of cybercrime campaigns in Latin America reveals a notable shift from opportunistic crimeware to more complex threats, including those targeting enterprises and governments
Editor • 20 Oct 2023
Business Security
Strengthening the weakest link: top 3 security awareness topics for your employees
Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats
Phil Muncaster • 19 Oct 2023
Better safe than sorry: 10 tips to build an effective business backup strategy
How robust backup practices can help drive resilience and improve cyber-hygiene in your company
Phil Muncaster • 18 Oct 2023
Operation King TUT: The universe of threats in LATAM
ESET researchers reveal a growing sophistication in threats affecting the LATAM region by employing evasion techniques and high-value targeting
Camilo Gutiérrez Amaya and Fernando Tavella • 17 Oct 2023
Staying on top of security updates – Week in security with Tony Anscombe
Why keeping software up to date is a crucial security practice that should be followed by everyone from individual users to SMBs and large enterprises
Editor • 13 Oct 2023
Cybercrime
Virus Bulletin – building digital armies
Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack
Cameron Camp • 11 Oct 2023
6 steps to getting the board on board with your cybersecurity program
How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives
Phil Muncaster • 11 Oct 2023
Virus Bulletin PUA – a love letter
Late nights at VB2023 featured intriguing interactions between security experts and the somewhat enigmatic world of grayware purveyors
Cameron Camp • 10 Oct 2023
Your family, home and small business need a cyber-resilience strategy, too!
Your preparedness to deal with cyberattacks is key for lessening the impact of a successful incident – even in home and small business environments
Tony Anscombe • 09 Oct 2023
DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine
Editor • 06 Oct 2023
ESET Research, Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center
Industroyer2: Industroyer reloaded
BackdoorDiplomacy: Upgrading from Quarian to Turian
Cybersecurity: A global problem that requires a global answer
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
Secure Coding
Capture the flag: 5 websites to sharpen your hacking skills
Sign up for our newsletters