Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Fake e-shops on the prowl for banking credentials using Android malware
ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks
Lukas Stefanko • 06 Apr 2022
Cybercrime
We’re going on Tor
If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the browser.
Jake Moore • 05 Apr 2022
Video
Week in security with Tony Anscombe
Under the hood of Wslink's VM – The energy sector & cyber-risk – SMB cybersecurity survival tips
Editor • 01 Apr 2022
Business Security
Cybersecurity survival tips for small businesses
How can businesses that lack the resources and technological expertise of large organizations hold the line against cybercriminals?
André Lameiras • 01 Apr 2022
Women in tech: Unique insights from a lifelong quest for innovation
Leading Slovak computer scientist Mária Bieliková shares her experience working as a woman driving technological innovation and reflects on how to inspire the next generation of talent in tech
Alžbeta Kovaľová • 30 Mar 2022
Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center, Business Security
Europe's quest for energy independence – and how cyber-risks come into play
Soaring energy prices and increased geopolitical tensions amid the Russian invasion of Ukraine bring a sharp focus on European energy security
André Lameiras and James Shepperd • 29 Mar 2022
Under the hood of Wslink’s multilayered virtual machine
ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques
Vladislav Hrčka • 28 Mar 2022
ESET discovers Mustang Panda's Hodur trojan – Crypto malware targeting Android and iOS users alike – Nation-state digital deterrent
Editor • 25 Mar 2022
Ukraine Crisis – Digital Security Resource Center, Business Security
Is a nation-state digital deterrent scenario so far-fetched?
Why has the conflict in Ukraine not caused the much anticipated global cyber-meltdown?
Tony Anscombe • 24 Mar 2022
Crypto malware in patched wallets targeting Android and iOS devices
ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets
Lukas Stefanko • 24 Mar 2022
Mustang Panda’s Hodur: Old tricks, new Korplug variant
ESET researchers have discovered Hodur, a previously undocumented Korplug variant spread by Mustang Panda, that uses phishing lures referencing current events in Europe, including the invasion of Ukraine
Alexandre Côté Cyr • 23 Mar 2022
Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center
Sandworm: A tale of disruption told anew
As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again
Rene Holt • 21 Mar 2022
We Live Progress
Black Hat Europe 2023: Should we regulate AI?
Digital Security
Fuel for thought: Can a driverless car get arrested?
Kids Online
Stop Cyberbullying Day: Prevention is everyone's responsibility
Ukraine Crisis – Digital Security Resource Center
Virtual private networks: 5 common questions about VPNs answered
How To
How to know if your email has been hacked
Sign up for our newsletters