Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Operation King TUT: The universe of threats in LATAM
ESET researchers reveal a growing sophistication in threats affecting the LATAM region by employing evasion techniques and high-value targeting
Camilo Gutiérrez Amaya and Fernando Tavella • 17 Oct 2023
Video
Staying on top of security updates – Week in security with Tony Anscombe
Why keeping software up to date is a crucial security practice that should be followed by everyone from individual users to SMBs and large enterprises
Editor • 13 Oct 2023
Cybercrime
Virus Bulletin – building digital armies
Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack
Cameron Camp • 11 Oct 2023
Business Security
6 steps to getting the board on board with your cybersecurity program
How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives
Phil Muncaster • 11 Oct 2023
Digital Security
Virus Bulletin PUA – a love letter
Late nights at VB2023 featured intriguing interactions between security experts and the somewhat enigmatic world of grayware purveyors
Cameron Camp • 10 Oct 2023
Your family, home and small business need a cyber-resilience strategy, too!
Your preparedness to deal with cyberattacks is key for lessening the impact of a successful incident – even in home and small business environments
Tony Anscombe • 09 Oct 2023
DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine
Editor • 06 Oct 2023
Social Media
Fake friends and followers on social media – and how to spot them
One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them.
Phil Muncaster • 06 Oct 2023
Operation Jacana: Foundling hobbits in Guyana
ESET researchers discovered a cyberespionage campaign against a governmental entity in Guyana
Fernando Tavella • 05 Oct 2023
We Live Progress, Digital Security
Playing your part in building a safer digital world: Why cybersecurity matters
In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being
Phil Muncaster • 03 Oct 2023
How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe
During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan
Editor • 29 Sep 2023
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
While analyzing a Lazarus attack luring employees of an aerospace company, ESET researchers discovered a publicly undocumented backdoor
Peter Kálnai • 29 Sep 2023
Play it safe: 5 reasons not to download pirated games
Kids Online
Cybersecurity starts at home: Help your children stay safe online with open conversations
A year in review: 10 of the biggest security incidents of 2023
Biometrics - can your fingerprint be ‘copied’ from a normal photo?
How often should you change your passwords?
Sign up for our newsletters