Latest Articles

Video

How to spot malicious spam – Week in security with Tony Anscombe

How to spot malicious spam – Week in security with Tony Anscombe

Video

How to spot malicious spam – Week in security with Tony Anscombe

As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam

Editor17 Jun 2022


Malware

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Malware

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?

Rene Holt16 Jun 2022


Ukraine Crisis – Digital Security Resource Center

Industroyer: A cyber-weapon that brought down a power grid

Industroyer: A cyber-weapon that brought down a power grid

Ukraine Crisis – Digital Security Resource Center

Industroyer: A cyber-weapon that brought down a power grid

Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids

André Lameiras13 Jun 2022


Video

3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe

3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe

Video

3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe

Here are three themes that stood out at the world's largest gathering of cybersecurity professionals

Editor10 Jun 2022


Digital Security

RSA – APIs, your organization’s dedicated backdoors

RSA – APIs, your organization’s dedicated backdoors

Digital Security

RSA – APIs, your organization’s dedicated backdoors

API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly

Cameron Camp10 Jun 2022


Privacy

RSA – Creepy real-world edition

RSA – Creepy real-world edition

Privacy

RSA – Creepy real-world edition

Digital fiddling somehow got mixed up in a real war

Cameron Camp09 Jun 2022


Digital Security

RSA – Digital healthcare meets security, but does it really want to?

RSA – Digital healthcare meets security, but does it really want to?

Digital Security

RSA – Digital healthcare meets security, but does it really want to?

Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission

Cameron Camp08 Jun 2022


Privacy

RSA – Spot the real fake

RSA – Spot the real fake

Privacy

RSA – Spot the real fake

How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer

Cameron Camp07 Jun 2022


Business Security

Cybersecurity awareness training: What is it and what works best?

Cybersecurity awareness training: What is it and what works best?

Business Security

Cybersecurity awareness training: What is it and what works best?

Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk

Phil Muncaster07 Jun 2022


Video

Key insights from ESET's latest Threat Report – Week in security with Tony Anscombe

Key insights from ESET's latest Threat Report – Week in security with Tony Anscombe

Video

Key insights from ESET's latest Threat Report – Week in security with Tony Anscombe

A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses

Editor03 Jun 2022


Ukraine Crisis – Digital Security Resource Center

100 days of war in Ukraine: How the conflict is playing out in cyberspace

100 days of war in Ukraine: How the conflict is playing out in cyberspace

Ukraine Crisis – Digital Security Resource Center

100 days of war in Ukraine: How the conflict is playing out in cyberspace

It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict

André Lameiras03 Jun 2022


Threat Reports

ESET Threat Report T1 2022

ESET Threat Report T1 2022

Threat Reports

ESET Threat Report T1 2022

A view of the T1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Roman Kováč02 Jun 2022