Award-winning news, views, and insight from the ESET security community
Facundo Muñoz • 22 Jan 2025 • 9 min. read
ESET Research
PlushDaemon compromises supply chain of Korean VPN service
Martin Smolár • 16 Jan 2025 • 12 min. read
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
ESET Research • 20 Dec 2024 • 1 min. read
ESET Research Podcast: Telekopye, again
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Video
New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe
Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes
Editor • 15 Dec 2023
OilRig’s persistent attacks using cloud service-powered downloaders
ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications
Zuzana Hromcová and Adam Burgher • 14 Dec 2023
Business Security, Digital Security
Delivering trust with DNS security
Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?
Alžbeta Kovaľová • 13 Dec 2023
A pernicious potpourri of Python packages in PyPI
The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository
Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023
We Live Progress
Black Hat Europe 2023: Should we regulate AI?
ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past?
Tony Anscombe • 11 Dec 2023
Mobile Security
Silent but deadly: The rise of zero-click attacks
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.
Márk Szabó • 11 Dec 2023
Surge in deceptive loan apps – Week in security with Tony Anscombe
ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi.
Editor • 08 Dec 2023
Critical Infrastructure
Black Hat Europe 2023: The past could return to haunt you
Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.
Tony Anscombe • 08 Dec 2023
Digital Security
To tap or not to tap: Are NFC payments safer?
Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods?
Márk Szabó • 07 Dec 2023
Privacy
Navigating privacy: Should we put the brakes on car tracking?
Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable?
Márk Szabó • 06 Dec 2023
Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths
ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play
Lukas Stefanko • 05 Dec 2023
Teaching appropriate use of AI tech – Week in security with Tony Anscombe
Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology
Editor • 01 Dec 2023
Sign up for our newsletters