Latest Articles

Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)

Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)

Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)

Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much

Editor01 Aug 2025


Why the tech industry needs to stand firm on preserving end-to-end encryption

Why the tech industry needs to stand firm on preserving end-to-end encryption

Why the tech industry needs to stand firm on preserving end-to-end encryption

Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity

Tony Anscombe01 Aug 2025


This month in security with Tony Anscombe – July 2025 edition

This month in security with Tony Anscombe – July 2025 edition

This month in security with Tony Anscombe – July 2025 edition

Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025

Editor31 Jul 2025


The hidden risks of browser extensions – and how to stay safe

The hidden risks of browser extensions – and how to stay safe

The hidden risks of browser extensions – and how to stay safe

Not all browser add-ons are handy helpers – some may contain far more than you have bargained for

Phil Muncaster29 Jul 2025


SharePoint under fire: ToolShell attacks hit organizations worldwide

SharePoint under fire: ToolShell attacks hit organizations worldwide

SharePoint under fire: ToolShell attacks hit organizations worldwide

The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks

Editor25 Jul 2025


ToolShell: An all-you-can-eat buffet for threat actors

ToolShell: An all-you-can-eat buffet for threat actors

ToolShell: An all-you-can-eat buffet for threat actors

ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities

ESET Research24 Jul 2025


Rogue CAPTCHAs: Look out for phony verification pages spreading malware

Rogue CAPTCHAs: Look out for phony verification pages spreading malware

Rogue CAPTCHAs: Look out for phony verification pages spreading malware

Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware

Phil Muncaster24 Jul 2025


Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4)

Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4)

Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4)

Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product.

Editor22 Jul 2025


Unmasking AsyncRAT: Navigating the labyrinth of forks

Unmasking AsyncRAT: Navigating the labyrinth of forks

Unmasking AsyncRAT: Navigating the labyrinth of forks

ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants

Nikola Knežević15 Jul 2025


How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)

How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)

How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)

Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.

Editor04 Jul 2025


Task scams: Why you should never pay to get paid

Task scams: Why you should never pay to get paid

Task scams: Why you should never pay to get paid

Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.

Phil Muncaster04 Jul 2025


How government cyber cuts will affect you and your business

How government cyber cuts will affect you and your business

How government cyber cuts will affect you and your business

Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks

Tony Anscombe03 Jul 2025


Apt Activity Report
MDR Protection