Award-winning news, views, and insight from the ESET security community
ESET Research • 05 Jun 2025 • 25 min. read
ESET Research
BladedFeline: Whispering in the dark
Tomáš Procházka • 22 May 2025 • 12 min. read
Danabot: Analyzing a fallen empire
Jakub Tomanek • 21 May 2025 • 13 min. read
ESET takes part in global operation to disrupt Lumma Stealer
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Digital Security
APT groups muddying the waters for MSPs
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers
James Shepperd • 02 May 2023
Video
What was hot at RSA Conference 2023? – Week in security with Tony Anscombe
The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated
Editor • 28 Apr 2023
RSA Conference 2023: How AI will infiltrate the world
As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications
Cameron Camp • 26 Apr 2023
Evasive Panda APT group delivers malware via updates for popular Chinese software
ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software
Facundo Muñoz • 26 Apr 2023
Did you mistakenly sell your network access? – Week in security with Tony Anscombe
Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks
Editor • 21 Apr 2023
Linux malware strengthens links between Lazarus and the 3CX supply-chain attack
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
Peter Kálnai and Marc-Etienne M.Léveillé • 20 Apr 2023
Critical Infrastructure
The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!
The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents
Márk Szabó • 19 Apr 2023
How To
PC running slow? 10 ways you can speed it up
Before you rush to buy new hardware, try these simple tricks to get your machine up to speed again – and keep it that way.
André Lameiras • 19 Apr 2023
Discarded, not destroyed: Old routers reveal corporate secrets
When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'
Cameron Camp and Tony Anscombe • 18 Apr 2023
Hunting down BlackLotus – Week in security with Tony Anscombe
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
Editor • 14 Apr 2023
Safety first: 5 cybersecurity tips for freelance bloggers
The much-dreaded writer’s block isn’t the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers?
Márk Szabó • 14 Apr 2023
What are the cybersecurity concerns of SMBs by sector?
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured
Editor • 12 Apr 2023
Sign up for our newsletters