Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Scams
Borrower beware: Common loan scams and how to avoid them
Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan.
Phil Muncaster • 26 Mar 2024
Kids Online
Cybersecurity starts at home: Help your children stay safe online with open conversations
Struggle to know how to help children and teens stay safe in cyberspace? A good ol’ fashioned chat is enough to put them on the right track.
Imogen Byers • 25 Mar 2024
Video
AceCryptor attacks surge in Europe – Week in security with Tony Anscombe
The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed the Rescoms RAT
Editor • 22 Mar 2024
Insight into ESET telemetry statistics about AceCryptor in H2 2023 with a focus on Rescoms campaigns in European countries
Jakub Kaloč • 20 Mar 2024
A prescription for privacy protection: Exercise caution when using a mobile health app
Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data
Phil Muncaster • 19 Mar 2024
Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe
Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023
Editor • 15 Mar 2024
Threat intelligence explained | Unlocked 403: A cybersecurity podcast
We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats
Alžbeta Kovaľová • 14 Mar 2024
How To
How to share sensitive files securely online
Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe
Phil Muncaster • 13 Mar 2024
Critical Infrastructure
Election cybersecurity: Protecting the ballot box and building trust in election integrity
What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?
Phil Muncaster • 12 Mar 2024
APT attacks taking aim at Tibetans – Week in security with Tony Anscombe
Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor
Editor • 08 Mar 2024
ESET researchers uncover strategic web compromise and supply-chain attacks targeting Tibetans
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024
Top 10 scams targeting seniors – and how to keep your money safe
The internet can be a wonderful place. But it’s also awash with fraudsters preying on people who are susceptible to fraud.
Phil Muncaster • 06 Mar 2024
How To, Privacy, Mobile Security
Are you being tracked? How to spot a tracking app on your phone
What happens with a hacked Instagram account – and how to recover it
BlackLotus UEFI bootkit: Myth confirmed
Beyond fun and games: Exploring privacy risks in children’s apps
Sign up for our newsletters