Award-winning news, views, and insight from the ESET security community
ESET Research • 05 Jun 2025 • 25 min. read
ESET Research
BladedFeline: Whispering in the dark
Tomáš Procházka • 22 May 2025 • 12 min. read
Danabot: Analyzing a fallen empire
Jakub Tomanek • 21 May 2025 • 13 min. read
ESET takes part in global operation to disrupt Lumma Stealer
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Digital Security
Microsoft Power Apps misconfiguration exposes millions of records
The caches of data that were publicly accessible included names, email addresses and social security numbers
Amer Owaida • 24 Aug 2021
The SideWalk may be as dangerous as the CROSSWALK
Meet SparklingGoblin, a member of the Winnti family
Mathieu Tartare and Thibaut Passilly • 24 Aug 2021
Video
Week in security with Tony Anscombe
Who is actually paying the ransom demand? – Be careful about what you throw away – Records from a terrorist watchlist exposed online
Editor • 20 Aug 2021
Cybercrime
Hackers swipe almost $100 million from major cryptocurrency exchange
Japanese cryptocurrency exchange Liquid suspends cryptocurrency deposits and withdrawals and moves its assets into cold storage
Amer Owaida • 20 Aug 2021
Are you, the customer, the one paying the ransomware demand?
Ransomware payments may have greater implications than you thought – and not just for the companies that paid up
Tony Anscombe • 19 Aug 2021
COVID-19
Health authorities in 40 countries targeted by COVID-19 vaccine scammers
Fraudsters impersonate vaccine manufacturers and authorities overseeing vaccine distribution efforts, INTERPOL warns
Amer Owaida • 18 Aug 2021
Nearly 2 million records from terrorist watchlist exposed online
The secret list was exposed online for three weeks, allowing anyone to access it without any kind of authentication
Amer Owaida • 17 Aug 2021
Dumpster diving is a filthy business
One man’s trash is another man’s treasure – here’s why you should think twice about what you toss in the recycling bin
Jake Moore • 17 Aug 2021
How IISpy spies on its victims and stays under the radar – IISerpent tampers with search engine results – How to avoid falling prey to ransomware
Editor • 13 Aug 2021
Examining threats to device security in the hybrid workplace
As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands
Phil Muncaster • 12 Aug 2021
IISerpent: Malware-driven SEO fraud as a service
The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites
Zuzana Hromcová • 11 Aug 2021
Scams
Deepfakes – the bot made me do it
As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what can you do to avoid falling victim to deepfake fraud?
Tony Anscombe • 10 Aug 2021
Sign up for our newsletters