Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Digital Security
2021 in review: The biggest cybersecurity stories of the year
As we close out another year like no other, let's look back at some of the most notable cybersecurity stories that shaped 2021
Tony Anscombe • 27 Dec 2021
Kids Online
This holiday season, give your children the gift of cybersecurity awareness
Don't leave your kids to their own devices – give them a head start with staying safe online instead
Tony Anscombe • 22 Dec 2021
Don’t forget to unplug your devices before you leave for the holidays!
As you down tools for the holiday season, be sure to also switch off the standby lights – it’s both cost effective and better for the environment
Tony Anscombe • 20 Dec 2021
Video
Week in security with Tony Anscombe
Why the vulnerability in Log4j poses a grave threat – What businesses should know about Log4Shell – ESET wraps up a series of deep-dives into Latin American banking trojans
Editor • 17 Dec 2021
Business Security
What every business leader needs to know about Log4Shell
Hundreds of thousands of attempts to exploit the vulnerability are under way
Rene Holt • 15 Dec 2021
The dirty dozen of Latin America: From Amavaldo to Zumanek
The grand finale of our series dedicated to demystifying Latin American banking trojans
ESET Research • 15 Dec 2021
How To
5 warning signs your identity has been stolen
By spotting these early warning signs of identity theft, you can minimize the impact on you and your family
Phil Muncaster • 14 Dec 2021
Log4Shell vulnerability: What we know so far
The critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here’s what we know so far
Rene Holt • 13 Dec 2021
How 'shoulder surfers' could hack into your Snapchat – Staying safe from gift card fraud – What is a buffer overflow vulnerability?
Editor • 10 Dec 2021
SnapHack: Watch out for those who can hack into anyone’s Snapchat!
Oh snap! This is how easy it may be for somebody to hijack your Snapchat account – all they need to do is peer over your shoulder.
Jake Moore • 09 Dec 2021
Scams
5 common gift card scams and how to spot them
It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season
Phil Muncaster • 07 Dec 2021
Secure Coding
What are buffer overflow attacks and how are they thwarted?
Ever since the Morris worm, buffer overflows have become notorious fare in the world of vulnerabilities
Rene Holt • 06 Dec 2021
Stop Cyberbullying Day: Prevention is everyone's responsibility
Linux malware strengthens links between Lazarus and the 3CX supply-chain attack
Mobile Security
Why your phone is slow – and how to speed it up
Amazon-themed campaigns of Lazarus in the Netherlands and Belgium
A recipe for failure: Predictably poor passwords
Sign up for our newsletters