Award-winning news, views, and insight from the ESET security community
Jakub Kaloč • 20 Mar 2024 • 8 min. read
ESET Research
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Matthieu Faou • 21 Feb 2024 • 11 min. read
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
Business Security, Digital Security
Delivering trust with DNS security
Digital Security
Deepfakes in the global election year of 2024: A weapon of mass deception?
COVID-19, Business Security
Do back offices mean backdoors?
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
James Shepperd • 29 Jun 2022
Cybercrime
5 common ways hackers steal credit card details
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe
Phil Muncaster • 27 Jun 2022
Video
Instagram’s new age verification tool – Week in security with Tony Anscombe
As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone's age on the internet?
Editor • 24 Jun 2022
Ukraine Crisis – Digital Security Resource Center
Virtual private networks: 5 common questions about VPNs answered
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
André Lameiras • 23 Jun 2022
Business Security
Phishing awareness training: Help your employees avoid the hook
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
Phil Muncaster • 21 Jun 2022
Privacy
Crypto mixers: What are they and how are they used?
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money
Sol González • 20 Jun 2022
How to spot malicious spam – Week in security with Tony Anscombe
As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
Editor • 17 Jun 2022
Malware
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
Rene Holt • 16 Jun 2022
Industroyer: A cyber-weapon that brought down a power grid
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
André Lameiras • 13 Jun 2022
3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe
Here are three themes that stood out at the world's largest gathering of cybersecurity professionals
Editor • 10 Jun 2022
RSA – APIs, your organization’s dedicated backdoors
API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly
Cameron Camp • 10 Jun 2022
RSA – Creepy real-world edition
Digital fiddling somehow got mixed up in a real war
Cameron Camp • 09 Jun 2022
Signed kernel drivers – Unguarded gateway to Windows’ core
No summer vacations for Zebrocy
Maltego: Check how exposed you are online
Scams
Are online surveys legit and safe? Watch out for survey scams
Sign up for our newsletters