Award-winning news, views, and insight from the ESET security community
Romain Dumont • 28 Aug 2024 • 14 min. read
ESET Research
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Lukas Stefanko and Jakub Osmani • 22 Aug 2024 • 18 min. read
NGate Android malware relays NFC traffic to steal cash
Jakub Osmani • 20 Aug 2024 • 11 min. read
Be careful what you pwish for – Phishing in PWA applications
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Video
Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams
Editor • 06 Sep 2024
ESET Research Podcast: HotPage
ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver
ESET Research • 05 Sep 2024
The key considerations for cyber insurance: A pragmatic approach
Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options
Tony Anscombe • 04 Sep 2024
Malware
In plain sight: Malicious ads hiding in search results
Sometimes there’s more than just an enticing product offer hiding behind an ad
Márk Szabó • 03 Sep 2024
Stealing cash using NFC relay – Week in Security with Tony Anscombe
The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become
Editor • 28 Aug 2024
Demystifying CVE-2024-7262 and CVE-2024-7263
Romain Dumont • 28 Aug 2024
Internet of Things
Old devices, new dangers: The risks of unsupported IoT tech
In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors
Márk Szabó • 27 Aug 2024
Video, Mobile Security
Exploring Android threats and ways to mitigate them | Unlocked 403 cybersecurity podcast (ep. 5)
The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it is to take over your phone, with some added tips on how to stay secure
Editor • 26 Aug 2024
PWA phishing on Android and iOS – Week in security with Tony Anscombe
Phishing using PWAs? ESET Research's latest discovery might just ruin some users' assumptions about their preferred platform's security
Editor • 23 Aug 2024
Android malware discovered by ESET Research relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM
Lukas Stefanko and Jakub Osmani • 22 Aug 2024
How regulatory standards and cyber insurance inform each other
Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with
Tony Anscombe • 21 Aug 2024
ESET analysts dissect a novel phishing method tailored to Android and iOS users
Jakub Osmani • 20 Aug 2024
Sign up for our newsletters