Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Ukraine Crisis – Digital Security Resource Center
GreyEnergy: Updated arsenal of one of the most dangerous threat actors
ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks
Anton Cherepanov and Robert Lipovsky • 17 Oct 2018
Phishers are after something unusual in ploy targeting book publishers
In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things
Tomáš Foltýn • 16 Oct 2018
Facebook downgrades victim count, details data accessed in breach
While the number of victims is lower than previously thought, the data accessed for millions of them is more sensitive than originally believed
Tomáš Foltýn • 15 Oct 2018
The Occasional Orator Part 3
Proper preparation can make all the difference when it comes to speaking at conferences
David Harley • 15 Oct 2018
Tips for minding the digital skills gap
The times they are a-changin‘, so how do you build and sharpen the skills that you need to avoid being left behind by the digital revolution?
Tomáš Foltýn • 12 Oct 2018
Video
Week in security with Tony Anscombe
TeleBots: First evidence linking Industroyer to NotPetya
Shane Curtis • 12 Oct 2018
New TeleBots backdoor: First evidence linking Industroyer to NotPetya
ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven
Anton Cherepanov and Robert Lipovsky • 11 Oct 2018
Scams
Send in the clones: Facebook cloning revisited
As another confusing message spreads, we look at Facebook privacy, cloning, and hacking
David Harley • 11 Oct 2018
Internet of Things
California outlaws poor default passwords in connected devices
The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets
Tomáš Foltýn • 10 Oct 2018
Google+ to shut down due to lack of adoption and privacy bug
Google has found no evidence of misuse of user information courtesy of a security glitch in the social platform’s API
Blockchain: What is it, how it works and how it is being used in the market
A closer look at the technology that is rapidly growing in popularity
Cecilia Pastorino • 09 Oct 2018
Most routers full of firmware flaws that leave users at risk
If you own a Wi-Fi router, it may well be riddled with security holes that expose you to a host of threats
Tomáš Foltýn • 08 Oct 2018
Gaming industry still in the scope of attackers in Asia
First clipper malware discovered on Google Play
Mobile Security
Face unlock on many Android smartphones falls for a photo
Digital Security
Target targeted: Five years on from a breach that shook the cybersecurity industry
Supply-chain attack on cryptocurrency exchange gate.io
Sign up for our newsletters