Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Video
How to spot malicious spam – Week in security with Tony Anscombe
As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam
Editor • 17 Jun 2022
Malware
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?
Rene Holt • 16 Jun 2022
Ukraine Crisis – Digital Security Resource Center
Industroyer: A cyber-weapon that brought down a power grid
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
André Lameiras • 13 Jun 2022
3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe
Here are three themes that stood out at the world's largest gathering of cybersecurity professionals
Editor • 10 Jun 2022
Digital Security
RSA – APIs, your organization’s dedicated backdoors
API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly
Cameron Camp • 10 Jun 2022
RSA – Creepy real-world edition
Digital fiddling somehow got mixed up in a real war
Cameron Camp • 09 Jun 2022
RSA – Digital healthcare meets security, but does it really want to?
Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission
Cameron Camp • 08 Jun 2022
RSA – Spot the real fake
How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer
Cameron Camp • 07 Jun 2022
Business Security
Cybersecurity awareness training: What is it and what works best?
Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk
Phil Muncaster • 07 Jun 2022
Key insights from ESET's latest Threat Report – Week in security with Tony Anscombe
A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses
Editor • 03 Jun 2022
100 days of war in Ukraine: How the conflict is playing out in cyberspace
It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict
André Lameiras • 03 Jun 2022
Threat Reports
ESET Threat Report T1 2022
A view of the T1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Roman Kováč • 02 Jun 2022
A dive into Turla PowerShell usage
Ransomware
RoT: Ransomware of Things
Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets
Scams
Beware of these 5 common scams you can encounter on Instagram
The rise of TeleBots: Analyzing disruptive KillDisk attacks
Sign up for our newsletters