Award-winning news, views, and insight from the ESET security community
ESET Research • 24 Jul 2025 • 3 min. read
ESET Research
ToolShell: An all-you-can-eat buffet for threat actors
Nikola Knežević • 15 Jul 2025 • 13 min. read
Unmasking AsyncRAT: Navigating the labyrinth of forks
ESET Research • 05 Jun 2025 • 25 min. read
BladedFeline: Whispering in the dark
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Video
Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)
Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
Editor • 01 Aug 2025
Privacy
Why the tech industry needs to stand firm on preserving end-to-end encryption
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Tony Anscombe • 01 Aug 2025
This month in security with Tony Anscombe – July 2025 edition
Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
Editor • 31 Jul 2025
Digital Security
The hidden risks of browser extensions – and how to stay safe
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
Phil Muncaster • 29 Jul 2025
SharePoint under fire: ToolShell attacks hit organizations worldwide
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
Editor • 25 Jul 2025
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities
ESET Research • 24 Jul 2025
Rogue CAPTCHAs: Look out for phony verification pages spreading malware
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
Phil Muncaster • 24 Jul 2025
Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4)
Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product.
Editor • 22 Jul 2025
ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants
Nikola Knežević • 15 Jul 2025
How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)
Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.
Editor • 04 Jul 2025
Scams
Task scams: Why you should never pay to get paid
Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.
Phil Muncaster • 04 Jul 2025
How government cyber cuts will affect you and your business
Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks
Tony Anscombe • 03 Jul 2025
Sign up for our newsletters