ESET researchers have discovered strategic web compromise (aka watering hole) attacks against high‑profile websites in the Middle East
ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs
Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field
A victim of identity theft tells us how criminals used his identity to commit fraud and what it took to put his life back in order
Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track.
ESET researchers discover a malware family with tools that show signs they’re used in targeted attacks
There are no code, functionality or operational similarities to suggest that this is a tool from a known threat actor
What are some of the key dangers faced by children online and how can you help protect them from the ghosts, ghouls and goblins creeping on the internet?
Cryptocurrencies rise and fall, but one thing stays the same – cybercriminals attempt to cash in on the craze
Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era
It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a breach
‘Tis the season to avoid getting played by scammers hijacking Twitter accounts and promoting fake offers for PlayStation 5 consoles and other red-hot products
Press play for the first episode as host Aryeh Goretsky is joined by Zuzana Hromcová to discuss native IIS malware
Putting a precision payload on top of more generic malware makes perfect sense for malware operators
Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed
There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe?
With the holiday shopping bonanza right around the corner, here's how to make sure your online spending spree is safe
The police sting spanned three continents and involved crackdowns in nine countries
Threat actors are increasingly using advanced tactics to obfuscate and launder their illicit gains, a report by the US Government finds
Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom