Latest Articles

We Live Science

Philip Torr: AI to the people | Starmus Highlights

Philip Torr: AI to the people | Starmus Highlights

We Live Science

Philip Torr: AI to the people | Starmus Highlights

We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact

Editor05 Dec 2024


Business Security

Achieving cybersecurity compliance in 5 steps

Achieving cybersecurity compliance in 5 steps

Business Security

Achieving cybersecurity compliance in 5 steps

Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements

Márk Szabó03 Dec 2024


We Live Science

Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus Highlights

Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus Highlights

We Live Science

Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus Highlights

ESET's CEO unpacks the complexities of cybersecurity in today’s hyper-connected world and highlights the power of innovation in stopping digital threats in their tracks

Editor02 Dec 2024


Video

Month in security with Tony Anscombe – November 2024 edition

Month in security with Tony Anscombe – November 2024 edition

Video

Month in security with Tony Anscombe – November 2024 edition

Zero days under attack, a new advisory from 'Five Eyes', thousands of ICS units left exposed, and mandatory MFA for all – it's a wrap on another month filled with impactful cybersecurity news

Editor29 Nov 2024


Scams

Scams to look out for this holiday season

Scams to look out for this holiday season

Scams

Scams to look out for this holiday season

‘Tis the season to be wary – be on your guard and don’t let fraud ruin your shopping spree

Phil Muncaster28 Nov 2024


Video

Bootkitty marks a new chapter in the evolution of UEFI threats

Bootkitty marks a new chapter in the evolution of UEFI threats

Video

Bootkitty marks a new chapter in the evolution of UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats

Editor27 Nov 2024


ESET Research

Bootkitty: Analyzing the first UEFI bootkit for Linux

Bootkitty: Analyzing the first UEFI bootkit for Linux

ESET Research

Bootkitty: Analyzing the first UEFI bootkit for Linux

ESET researchers analyze the first UEFI bootkit designed for Linux systems

Martin Smolár and Peter Strýček27 Nov 2024


Video

Firefox and Windows zero days chained to deliver the RomCom backdoor

Firefox and Windows zero days chained to deliver the RomCom backdoor

Video

Firefox and Windows zero days chained to deliver the RomCom backdoor

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds

Editor26 Nov 2024


ESET Research

RomCom exploits Firefox and Windows zero days in the wild

RomCom exploits Firefox and Windows zero days in the wild

ESET Research

RomCom exploits Firefox and Windows zero days in the wild

ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit

Damien Schaeffer and Romain Dumont26 Nov 2024


ESET Research

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

ESET Research

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

ESET researchers analyzed previously unknown Linux backdoors that are connected to known Windows malware used by the China-aligned Gelsemium group, and to Project Wood

Viktor Šperka21 Nov 2024


We Live Science

Kathryn Thornton: Correcting Hubble's vision | Starmus Highlights

Kathryn Thornton: Correcting Hubble's vision | Starmus Highlights

We Live Science

Kathryn Thornton: Correcting Hubble's vision | Starmus Highlights

The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork made Hubble’s success possible

Editor20 Nov 2024


Digital Security

My information was stolen. Now what?

My information was stolen. Now what?

Digital Security

My information was stolen. Now what?

The slow and painful recovery process

Aryeh Goretsky19 Nov 2024


Apt Activity Report
MDR Protection