Award-winning news, views, and insight from the ESET security community
Matthieu Faou • 21 Feb 2024 • 11 min. read
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
Lukas Stefanko • 01 Feb 2024 • 12 min. read
ESET Research
VajraSpy: A Patchwork of espionage apps
ESET Research • 30 Jan 2024 • 15 min. read
ESET takes part in global operation to disrupt the Grandoreiro banking trojan
Business Security, Digital Security
Delivering trust with DNS security
Digital Security
Deepfakes in the global election year of 2024: A weapon of mass deception?
Video
PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombe
Coming in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjects
Editor • 23 Feb 2024
Everything you need to know about IP grabbers
You would never give your personal ID to random strangers, right? So why provide the ID of your computer? Unsuspecting users beware, IP grabbers do not ask for your permission.
Márk Szabó • 22 Feb 2024
A mix of PSYOPs, espionage and … fake Canadian pharmacies!
Matthieu Faou • 21 Feb 2024
How To
Watching out for the fakes: How to spot online disinformation
Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes?
Márk Szabó • 20 Feb 2024
Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe
Here's how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals
Editor • 16 Feb 2024
What is AI, really? | Unlocked 403: A cybersecurity podcast
Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack AI's basics, applications and broader implications.
Alžbeta Kovaľová • 15 Feb 2024
Cybercrime
The art of digital sleuthing: How digital forensics unlocks the truth
Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell
Lucas Paus and Mario Micucci • 14 Feb 2024
As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern
Phil Muncaster • 13 Feb 2024
Video, Ransomware
Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe
Called a "watershed year for ransomware", 2023 marked a reversal from the decline in ransomware payments observed in the previous year
Editor • 09 Feb 2024
Business Security
The buck stops here: Why the stakes are high for CISOs
Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?
Phil Muncaster • 08 Feb 2024
Left to their own devices: Security for employees using personal devices for work
As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it
Christian Ali Bravo • 06 Feb 2024
Scams
Could your Valentine be a scammer? How to avoid getting caught in a bad romance
With Valentine’s Day almost upon us, here’s some timely advice on how to prevent scammers from stealing more than your heart
Imogen Byers • 05 Feb 2024
SnapHack: Watch out for those who can hack into anyone’s Snapchat!
Scams, Digital Security
Is Temu safe? What to know before you ‘shop like a billionaire’
Privacy
What you need to know about iCloud Private Relay
Winnti Group targeting universities in Hong Kong
Sign up for our newsletters