Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Kids Online
Talking to children about the internet: A kid’s perspective
A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet
André Lameiras • 01 Jun 2022
Ukraine Crisis – Digital Security Resource Center
Keeping it real: Don’t fall for lies about the war
Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what’s in the fake news
André Lameiras • 30 May 2022
Video
Scams targeting NFT investors – Week in security with Tony Anscombe
As with everything digital, there's someone, somewhere devising a method to steal the assets away from their rightful owners
Editor • 27 May 2022
Business Security
Cybersecurity: A global problem that requires a global answer
New and exacerbated cyber-risks following Russia’s invasion of Ukraine are fueling a new urgency towards enhancing resilience
André Lameiras • 27 May 2022
ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit
Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution
ESET Research • 26 May 2022
5 reasons why GDPR was a milestone for data protection
The landmark regulation changed everyone’s mindset on how companies worldwide collect and use the personal data of EU citizens
André Lameiras • 25 May 2022
Scams
Common NFT scams and how to avoid them
As NFTs exploded in popularity, scammers also jumped on the hype. Watch out for counterfeit NFTs, rug pulls, pump-and-dumps and other common scams plaguing the industry.
Mario Micucci • 23 May 2022
Cryptocurrency: secure or not? – Week in security with Tony Anscombe
When you hear the term ‘cryptocurrency’, does ‘secure’ also spring to mind? Here are some implications of the lack of sound security practices in the world of crypto.
Editor • 20 May 2022
Sandworm uses a new version of ArguePatch to attack targets in Ukraine
ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks
The flip side of the coin: Why crypto is catnip for criminals
Cybercriminals continue to mine for opportunities in the crypto space – here's what you should know about coin-mining hacks and crypto theft
Thomas Uhlemann • 19 May 2022
Fake news – why do people believe it?
In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real
André Lameiras • 18 May 2022
Ransomware
The downside of ‘debugging’ ransomware
The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code
Cameron Camp and Aryeh Goretsky • 16 May 2022
How To
Third-party cookies: How they work and how to stop them from tracking you across the web
OilRig’s persistent attacks using cloud service-powered downloaders
Digital Security
The future starts now: 10 major challenges facing cybersecurity
We Live Progress
Black Hat Europe 2023: Should we regulate AI?
Linux malware strengthens links between Lazarus and the 3CX supply-chain attack
Sign up for our newsletters