Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Digital Security
Nearly 2 million records from terrorist watchlist exposed online
The secret list was exposed online for three weeks, allowing anyone to access it without any kind of authentication
Amer Owaida • 17 Aug 2021
Dumpster diving is a filthy business
One man’s trash is another man’s treasure – here’s why you should think twice about what you toss in the recycling bin
Jake Moore • 17 Aug 2021
Video
Week in security with Tony Anscombe
How IISpy spies on its victims and stays under the radar – IISerpent tampers with search engine results – How to avoid falling prey to ransomware
Editor • 13 Aug 2021
COVID-19, Business Security
Examining threats to device security in the hybrid workplace
As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands
Phil Muncaster • 12 Aug 2021
IISerpent: Malware-driven SEO fraud as a service
The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites
Zuzana Hromcová • 11 Aug 2021
Scams
Deepfakes – the bot made me do it
As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what can you do to avoid falling victim to deepfake fraud?
Tony Anscombe • 10 Aug 2021
Ransomware, Business Security
Ransomware runs rampant, so how can you combat this threat?
A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim
Ondrej Kubovič • 10 Aug 2021
DEF CON 29: Satellite hacking 101
How poking at the innards of satellites can make the future of cybersecurity in space more palatable
Cameron Camp • 09 Aug 2021
IISpy: A complex server-side backdoor with anti-forensic features
The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers
Zuzana Hromcová • 09 Aug 2021
ESET research dissects IIS web server threats – How IIStealer steals credit card data – The flood of spam in your inbox
Editor • 06 Aug 2021
Black Hat 2021: Lessons from a lawyer
Why companies and their security teams need to engage with a lawyer before an incident occurs
Tony Anscombe • 06 Aug 2021
Cybercrime
Black Hat 2021: Wanted posters for ransomware slingers
Is the net closing in on cyber-extortionists and can bounties on their collective heads ultimately help stem the ransomware scourge?
Cameron Camp • 06 Aug 2021
How To
Mobile payment apps: How to stay safe when paying with your phone
Internet of Things
Warning issued over hackable security cameras
From Agent.BTZ to ComRAT v4: A ten-year journey
ESET Research, Business Security
It’s time to disconnect RDP from the internet
How to tell if your password has been stolen in a security breach
Sign up for our newsletters