Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Video
DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine
Editor • 06 Oct 2023
Social Media
Fake friends and followers on social media – and how to spot them
One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them.
Phil Muncaster • 06 Oct 2023
Operation Jacana: Foundling hobbits in Guyana
ESET researchers discovered a cyberespionage campaign against a governmental entity in Guyana
Fernando Tavella • 05 Oct 2023
We Live Progress, Digital Security
Playing your part in building a safer digital world: Why cybersecurity matters
In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being
Phil Muncaster • 03 Oct 2023
How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe
During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan
Editor • 29 Sep 2023
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
While analyzing a Lazarus attack luring employees of an aerospace company, ESET researchers discovered a publicly undocumented backdoor
Peter Kálnai • 29 Sep 2023
Secure Coding
5 of the top programming languages for cybersecurity
While far from all roles in security explicitly demand coding skills, it’s challenging to envision a career in this field that wouldn’t derive substantial advantages from at least a basic understanding of fundamental coding principles
Christian Ali Bravo • 27 Sep 2023
Secure Coding, Business Security
Can open-source software be secure?
Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?
Aryeh Goretsky and Cameron Camp • 26 Sep 2023
ESET's cutting-edge threat research at LABScon – Week in security with Tony Anscombe
Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups
Editor • 22 Sep 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph
ESET researchers have discovered Deadglyph, a sophisticated backdoor used by the infamous Stealth Falcon group for espionage in the Middle East
ESET Research • 22 Sep 2023
OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes
ESET researchers document OilRig’s Outer Space and Juicy Mix campaigns, targeting Israeli organizations in 2021 and 2022
Zuzana Hromcová and Adam Burgher • 21 Sep 2023
We Live Progress
10 tips to ace your cybersecurity job interview
Once you’ve made it past the initial screening process and secured that all-important interview, it’s time to seal the deal. These 10 tips will put you on the right track.
Phil Muncaster • 18 Sep 2023
Digital Security
Play it safe: 5 reasons not to download pirated games
RDP remains a security concern – Week in security with Tony Anscombe
The world’s most common passwords: What to do if yours is on the list
Business Security
Cybersecurity: A global problem that requires a global answer
Business Security, Secure Coding
Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses
Sign up for our newsletters