Award-winning news, views, and insight from the ESET security community
Romain Dumont • 28 Aug 2024 • 14 min. read
ESET Research
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Lukas Stefanko and Jakub Osmani • 22 Aug 2024 • 18 min. read
NGate Android malware relays NFC traffic to steal cash
Jakub Osmani • 20 Aug 2024 • 11 min. read
Be careful what you pwish for – Phishing in PWA applications
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
We Live Progress
Irresistible: Hooks, habits and why you can’t put down your phone
Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices.
Imogen Byers • 05 Mar 2024
Video
Deceptive AI content and 2024 elections – Week in security with Tony Anscombe
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year
Editor • 01 Mar 2024
Business Security, Secure Coding
Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses
Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor
David González Cuautle • 29 Feb 2024
Vulnerabilities in business VPNs under the spotlight
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk
Márk Szabó • 28 Feb 2024
Social Media
10 things to avoid posting on social media – and why
Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.
Phil Muncaster • 26 Feb 2024
PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombe
Coming in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjects
Editor • 23 Feb 2024
Digital Security
Everything you need to know about IP grabbers
Unsuspecting users beware, IP grabbers do not ask for your permission.
Márk Szabó • 22 Feb 2024
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
A mix of PSYOPs, espionage and … fake Canadian pharmacies!
Matthieu Faou • 21 Feb 2024
How To
Watching out for the fakes: How to spot online disinformation
Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes?
Márk Szabó • 20 Feb 2024
Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe
Here's how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals
Editor • 16 Feb 2024
What is AI, really? | Unlocked 403 cybersecurity podcast (ep. 1)
Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack AI's basics, applications and broader implications.
Editor • 15 Feb 2024
Cybercrime
The art of digital sleuthing: How digital forensics unlocks the truth
Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell
Lucas Paus and Mario Micucci • 14 Feb 2024
Sign up for our newsletters