Latest Articles

This month in security with Tony Anscombe – November 2025 edition

This month in security with Tony Anscombe – November 2025 edition

This month in security with Tony Anscombe – November 2025 edition

Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news

Editor28 Nov 2025


What parents should know to protect their children from doxxing

What parents should know to protect their children from doxxing

What parents should know to protect their children from doxxing

Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.

Phil Muncaster27 Nov 2025


Influencers in the crosshairs: How cybercriminals are targeting content creators

Influencers in the crosshairs: How cybercriminals are targeting content creators

Influencers in the crosshairs: How cybercriminals are targeting content creators

Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.

Phil Muncaster25 Nov 2025


MDR is the answer – now, what’s the question?

MDR is the answer – now, what’s the question?

MDR is the answer – now, what’s the question?

Why your business needs the best-of-breed combination of technology and human expertise

Steven Connolly24 Nov 2025


The OSINT advantage: Find your weak spots before attackers do

The OSINT advantage: Find your weak spots before attackers do

The OSINT advantage: Find your weak spots before attackers do

Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots

Mario Micucci20 Nov 2025


PlushDaemon compromises network devices for adversary-in-the-middle attacks

PlushDaemon compromises network devices for adversary-in-the-middle attacks

PlushDaemon compromises network devices for adversary-in-the-middle attacks

ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks

Facundo Muñoz and Dávid Gábriš19 Nov 2025


What if your romantic AI chatbot can’t keep a secret?

What if your romantic AI chatbot can’t keep a secret?

What if your romantic AI chatbot can’t keep a secret?

Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.

Phil Muncaster17 Nov 2025


How password managers can be hacked – and how to stay safe

How password managers can be hacked – and how to stay safe

How password managers can be hacked – and how to stay safe

Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe

Phil Muncaster13 Nov 2025


Why shadow AI could be your biggest security blind spot

Why shadow AI could be your biggest security blind spot

Why shadow AI could be your biggest security blind spot

From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company

Phil Muncaster11 Nov 2025


In memoriam: David Harley

In memoriam: David Harley

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security

Editor07 Nov 2025


The who, where, and how of APT attacks in Q2 2025–Q3 2025

The who, where, and how of APT attacks in Q2 2025–Q3 2025

The who, where, and how of APT attacks in Q2 2025–Q3 2025

ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report

Editor07 Nov 2025


ESET APT Activity Report Q2 2025–Q3 2025

ESET APT Activity Report Q2 2025–Q3 2025

ESET APT Activity Report Q2 2025–Q3 2025

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025

Jean-Ian Boutin06 Nov 2025


Apt Activity Report
MDR Protection