Award-winning news, views, and insight from the ESET security community
ESET Research • 02 Dec 2025 • 20 min. read
ESET Research
MuddyWater: Snakes by the riverbank
Facundo Muñoz and Dávid Gábriš • 19 Nov 2025 • 9 min. read
PlushDaemon compromises network devices for adversary-in-the-middle attacks
Peter Kálnai and Alexis Rapin • 23 Oct 2025 • 12 min. read
Gotta fly: Lazarus targets the UAV sector
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Scams
Tax identity fraud: Bringing the fight to this menace
Tax identity fraud is a multibillion dollar industry for criminals. ESET's Lysa Myers explores new measures and offers some top tips on how to tackle this menace.
Lysa Myers • 06 Apr 2017
Millennials and GDPR ‘pose increased cybersecurity risk to companies’
Millennials and the demands of upcoming GDPR regulations could result in a greater cybersecurity risk for many businesses, new research has suggested.
Editor • 05 Apr 2017
IAAF: 'Fancy Bear' Sednit behind cyberattack
The IAAF has become the latest organization to fall victim to the cybercriminal gang Sednit.
Editor • 04 Apr 2017
Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Play
ESET researchers have discovered a malicious app at Google Play tricking its victims into paying €18 ($19) for Adobe Flash Player.
Peter Stancik • 04 Apr 2017
Privacy
The right to privacy in the digital era
ESET's Miguel Ángel Mendoza discusses the right to privacy in the digital era, which is an increasingly important issue.
Miguel Ángel Mendoza • 03 Apr 2017
Digital Security
Backup your (digital) life
In the digital age, data backup is essential. Find out how you can protect yourself ahead of World Backup Day, which falls on April Fool's Day.
Editor • 31 Mar 2017
Malware
Malware campaign targets open source developers on GitHub
Be on your guard if you're a developer who uses GitHub - someone could be trying to infect your computer with malware.
Graham Cluley • 30 Mar 2017
Carbon Paper: Peering into Turla’s second stage backdoor
The Turla espionage group has been targeting various institutions for many years. Recently, ESET found several new versions of Carbon.
ESET Research • 30 Mar 2017
Close to 1.4 billion data records compromised in 2016
Over a billion data records were compromised globally in 2016, according to Gemalto’s latest Breach Level Index.
Narinder Purba • 28 Mar 2017
How To
How to configure WinDbg for kernel debugging
In this post, Matías Porolli looks at how to configure an environment with WinDbg and virtual machines in order to debug drivers or code running in Windows kernel space.
Matías Porolli • 27 Mar 2017
Apple underwhelmed by latest CIA exploits revealed by WikiLeaks
WikiLeaks's revelations about security vulnerabilities in Apple products appear to be a damp squib.
Graham Cluley • 24 Mar 2017
16 years of Mac OS X: Secure but not invincible to malware
Mac OS X is still secure 16 years after its creation, but increasingly being targeted by cybercriminals. No operating system is 100% malware-proof.
Ondrej Kubovič • 24 Mar 2017
Sign up for our newsletters