Latest Articles

Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?

Tony Anscombe12 Dec 2024


How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats?

Editor10 Dec 2024


Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost

Phil Muncaster09 Dec 2024


Philip Torr: AI to the people | Starmus highlights

Philip Torr: AI to the people | Starmus highlights

Philip Torr: AI to the people | Starmus highlights

We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact

Tomáš Foltýn05 Dec 2024


Achieving cybersecurity compliance in 5 steps

Achieving cybersecurity compliance in 5 steps

Achieving cybersecurity compliance in 5 steps

Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements

Márk Szabó03 Dec 2024


Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights

Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights

Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights

ESET's CEO unpacks the complexities of cybersecurity in today’s hyper-connected world and highlights the power of innovation in stopping digital threats in their tracks

Tomáš Foltýn02 Dec 2024


Month in security with Tony Anscombe – November 2024 edition

Month in security with Tony Anscombe – November 2024 edition

Month in security with Tony Anscombe – November 2024 edition

Zero days under attack, a new advisory from 'Five Eyes', thousands of ICS units left exposed, and mandatory MFA for all – it's a wrap on another month filled with impactful cybersecurity news

Editor29 Nov 2024


Scams to look out for this holiday season

Scams to look out for this holiday season

Scams to look out for this holiday season

‘Tis the season to be wary – be on your guard and don’t let fraud ruin your shopping spree

Phil Muncaster28 Nov 2024


Bootkitty marks a new chapter in the evolution of UEFI threats

Bootkitty marks a new chapter in the evolution of UEFI threats

Bootkitty marks a new chapter in the evolution of UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats

Editor27 Nov 2024


Bootkitty: Analyzing the first UEFI bootkit for Linux

Bootkitty: Analyzing the first UEFI bootkit for Linux

Bootkitty: Analyzing the first UEFI bootkit for Linux

ESET researchers analyze the first UEFI bootkit designed for Linux systems

Martin Smolár and Peter Strýček27 Nov 2024


Firefox and Windows zero days chained to deliver the RomCom backdoor

Firefox and Windows zero days chained to deliver the RomCom backdoor

Firefox and Windows zero days chained to deliver the RomCom backdoor

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds

Editor26 Nov 2024


RomCom exploits Firefox and Windows zero days in the wild

RomCom exploits Firefox and Windows zero days in the wild

RomCom exploits Firefox and Windows zero days in the wild

ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit

Damien Schaeffer and Romain Dumont26 Nov 2024


Apt Activity Report
MDR Protection