Latest Articles

How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)

How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)

How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)

Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.

Editor04 Jul 2025


Task scams: Why you should never pay to get paid

Task scams: Why you should never pay to get paid

Task scams: Why you should never pay to get paid

Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.

Phil Muncaster04 Jul 2025


How government cyber cuts will affect you and your business

How government cyber cuts will affect you and your business

How government cyber cuts will affect you and your business

Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks

Tony Anscombe03 Jul 2025


Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset

Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset

Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset

ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024

Zoltán Rusnák02 Jul 2025


ESET Threat Report H1 2025: Key findings

ESET Threat Report H1 2025: Key findings

ESET Threat Report H1 2025: Key findings

ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025

Editor01 Jul 2025


ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits

ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits

ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits

ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report

ESET Research01 Jul 2025


This month in security with Tony Anscombe – June 2025 edition

This month in security with Tony Anscombe – June 2025 edition

This month in security with Tony Anscombe – June 2025 edition

From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news

Editor28 Jun 2025


ESET Threat Report H1 2025

ESET Threat Report H1 2025

ESET Threat Report H1 2025

A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč26 Jun 2025


BladedFeline: Whispering in the dark

BladedFeline: Whispering in the dark

BladedFeline: Whispering in the dark

ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig

ESET Research05 Jun 2025


Don’t let dormant accounts become a doorway for cybercriminals

Don’t let dormant accounts become a doorway for cybercriminals

Don’t let dormant accounts become a doorway for cybercriminals

Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.

Phil Muncaster02 Jun 2025


This month in security with Tony Anscombe – May 2025 edition

This month in security with Tony Anscombe – May 2025 edition

This month in security with Tony Anscombe – May 2025 edition

From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news

Editor30 May 2025


Word to the wise: Beware of fake Docusign emails

Word to the wise: Beware of fake Docusign emails

Word to the wise: Beware of fake Docusign emails

Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data

Phil Muncaster27 May 2025


Apt Activity Report
MDR Protection