Award-winning news, views, and insight from the ESET security community
Jakub Souček • 10 Sep 2024 • 18 min. read
ESET Research
CosmicBeetle steps up: Probation period at RansomHub
Romain Dumont • 28 Aug 2024 • 14 min. read
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Lukas Stefanko and Jakub Osmani • 22 Aug 2024 • 18 min. read
NGate Android malware relays NFC traffic to steal cash
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Digital Security, Business Security
Cyber: The Swiss army knife of tradecraft
In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike
Andy Garth • 29 Jan 2024
Video
Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe
The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UK
Editor • 26 Jan 2024
Assessing and mitigating supply chain cybersecurity risks
Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management
Phil Muncaster • 25 Jan 2024
NSPX30: A sophisticated AitM-enabled implant evolving since 2005
ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group we have named Blackwood
Facundo Muñoz • 24 Jan 2024
Scams
Break the fake: The race is on to stop AI voice cloning scams
As AI-powered voice cloning turbocharges imposter scams, we sit down with ESET’s Jake Moore to discuss how to hang up on ‘hi-fi’ scam calls – and what the future holds for deepfake detection
Cameron Camp • 23 Jan 2024
Why many CISOs consider quitting – Week in security with Tony Anscombe
The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings
Editor • 19 Jan 2024
Virtual kidnapping: How to see through this terrifying scam
Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims
Phil Muncaster • 18 Jan 2024
Scams, Digital Security
Is Temu safe? What to know before you ‘shop like a billionaire’
Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal
Phil Muncaster • 17 Jan 2024
The 7 deadly cloud security sins – and how SMBs can do things better
By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk
Phil Muncaster • 16 Jan 2024
Lessons from SEC's X account hack – Week in security with Tony Anscombe
The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFs
Editor • 12 Jan 2024
A peek behind the curtain: How are sock puppet accounts used in OSINT?
How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks
Mario Micucci • 11 Jan 2024
Mobile Security
Attack of the copycats: How fake messaging apps and app mods could bite you
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride.
Phil Muncaster • 10 Jan 2024
Sign up for our newsletters