
Latest Articles
How an innocuous app morphed into a trojan – Week in security with Tony Anscombe
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
Shedding light on AceCryptor and its operation
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families
Digital security for the self‑employed: Staying safe without an IT team to help
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business
Android app breaking bad: From legitimate screen recording to file exfiltration within a year
ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio
The real cost of a free lunch – Week in security with Tony Anscombe
Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for
Top 5 search engines for internet‑connected devices and services
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
Meet “AI”, your new colleague: could it expose your company’s secrets?
Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk
You may not care where you download software from, but malware does
Why do people still download files from sketchy places and get compromised as a result?
Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
Why you need parental control software – and 5 features to look for
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
Turning on stealth mode: 5 simple strategies for staying under the radar online
Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details
ESET APT Activity Report Q4 2022–Q1 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023
How the war in Ukraine has been a catalyst in private‑public collaborations
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
APTs target MSP access to customer networks – Week in security with Tony Anscombe
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
Creating strong, yet user‑friendly passwords: Tips for your business password policy
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization
Using Discord? Don’t play down its privacy and security risks
It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut
APT groups muddying the waters for MSPs
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers
What was hot at RSA Conference 2023? – Week in security with Tony Anscombe
The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated
RSA Conference 2023 – How AI will infiltrate the world
As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications
Evasive Panda APT group delivers malware via updates for popular Chinese software
ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software