Award-winning news, views, and insight from the ESET security community
Anton Cherepanov and Peter Strýček • 18 Dec 2025 • 18 min. read
ESET Research
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
Jiří Kropáč • 16 Dec 2025 • 2 min. read
ESET Threat Report H2 2025
ESET Research • 02 Dec 2025 • 20 min. read
MuddyWater: Snakes by the riverbank
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Social Media
Influencers in the crosshairs: How cybercriminals are targeting content creators
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
Phil Muncaster • 25 Nov 2025
MDR is the answer – now, what’s the question?
Why your business needs the best-of-breed combination of technology and human expertise
Steven Connolly • 24 Nov 2025
Privacy
The OSINT advantage: Find your weak spots before attackers do
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
Mario Micucci • 20 Nov 2025
PlushDaemon compromises network devices for adversary-in-the-middle attacks
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
Facundo Muñoz and Dávid Gábriš • 19 Nov 2025
What if your romantic AI chatbot can’t keep a secret?
Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.
Phil Muncaster • 17 Nov 2025
Digital Security
How password managers can be hacked – and how to stay safe
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
Phil Muncaster • 13 Nov 2025
Why shadow AI could be your biggest security blind spot
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
Phil Muncaster • 11 Nov 2025
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
Editor • 07 Nov 2025
Video
The who, where, and how of APT attacks in Q2 2025–Q3 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
Threat Reports
ESET APT Activity Report Q2 2025–Q3 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
Jean-Ian Boutin • 06 Nov 2025
Scams
Sharing is scaring: The WhatsApp scam you didn’t see coming
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
Christian Ali Bravo • 05 Nov 2025
How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)
Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead
Editor • 04 Nov 2025
Sign up for our newsletters