Award-winning news, views, and insight from the ESET security community
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
ESET Research
Evasive Panda leverages Monlam Festival to target Tibetans
Matthieu Faou • 21 Feb 2024 • 11 min. read
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
Lukas Stefanko • 01 Feb 2024 • 12 min. read
VajraSpy: A Patchwork of espionage apps
Business Security, Digital Security
Delivering trust with DNS security
Digital Security
Deepfakes in the global election year of 2024: A weapon of mass deception?
Safeguard the joy: 10 tips for securing your shiny new device
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly
Phil Muncaster • 21 Dec 2023
Mobile Security
These aren’t the Androids you should be looking for
You may get more than you bargained for when you buy a budget-friendly smartphone and forgo safeguards baked into Google Play
Roman Cuprik and Thomas Uhlemann • 20 Dec 2023
ESET Research, Threat Reports
ESET Threat Report H2 2023
A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Jiří Kropáč • 19 Dec 2023
ESET Research Podcast: Neanderthals, Mammoths and Telekopye
ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces
ESET Research • 18 Dec 2023
Video
New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe
Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes
Editor • 15 Dec 2023
OilRig’s persistent attacks using cloud service-powered downloaders
ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications
Zuzana Hromcová and Adam Burgher • 14 Dec 2023
Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?
Alžbeta Kovaľová • 13 Dec 2023
A pernicious potpourri of Python packages in PyPI
The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository
Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023
We Live Progress
Black Hat Europe 2023: Should we regulate AI?
ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past?
Tony Anscombe • 11 Dec 2023
Silent but deadly: The rise of zero-click attacks
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.
Márk Szabó • 11 Dec 2023
Surge in deceptive loan apps – Week in security with Tony Anscombe
ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi.
Editor • 08 Dec 2023
Critical Infrastructure
Black Hat Europe 2023: The past could return to haunt you
Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.
Tony Anscombe • 08 Dec 2023
Scams
Top 10 Venmo scams: Don't fall for these common tricks
Common WhatsApp scams and how to avoid them
How To
What happens with a hacked Instagram account – and how to recover it
Business Security
Vulnerabilities in business VPNs under the spotlight
Can your iPhone be hacked? What to know about iOS security
Sign up for our newsletters