Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Internet of Things
Hear no evil: Ultrasound attacks on voice assistants
How your voice assistant could do the bidding of a hacker – without you ever hearing a thing
Márk Szabó • 07 Jun 2023
Mobile Security
7 tips for spotting a fake mobile app
Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future
Roman Cuprik • 06 Jun 2023
Video
API security in the spotlight – Week in security with Tony Anscombe
Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.
Editor • 02 Jun 2023
Secure Coding
All eyes on APIs: Top 3 API security risks and how to mitigate them
As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency
Phil Muncaster • 01 Jun 2023
Social Media
5 free OSINT tools for social media
A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms
Martina López • 31 May 2023
Scams
Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys
Roman Cuprik • 30 May 2023
How an innocuous app morphed into a trojan – Week in security with Tony Anscombe
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
Editor • 26 May 2023
Shedding light on AceCryptor and its operation
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families
Jakub Kaloč • 25 May 2023
Digital Security, Business Security
Digital security for the self-employed: Staying safe without an IT team to help
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business
Phil Muncaster • 24 May 2023
Android app breaking bad: From legitimate screen recording to file exfiltration within a year
ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio
Lukas Stefanko • 23 May 2023
The real cost of a free lunch – Week in security with Tony Anscombe
Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for
Editor • 19 May 2023
Digital Security
Top 5 search engines for internet-connected devices and services
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
Camilo Gutiérrez Amaya • 18 May 2023
Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe
Alexa, who else is listening?
Cybercrime
The art of digital sleuthing: How digital forensics unlocks the truth
Virtual kidnapping: How to see through this terrifying scam
APT attacks taking aim at Tibetans – Week in security with Tony Anscombe
Sign up for our newsletters