Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Critical Infrastructure, Malware
Black Hat 2023: Cyberwar fire-and-forget-me-not
What happens to cyberweapons after a cyberwar?
Cameron Camp • 11 Aug 2023
ESET Research Podcast: Unmasking MoustachedBouncer
Listen as ESET's Director of Threat Research Jean-Ian Boutin unravels the tactics, techniques and procedures of MoustachedBouncer, an APT group taking aim at foreign embassies in Belarus
ESET Research • 10 Aug 2023
MoustachedBouncer: Espionage against foreign diplomats in Belarus
Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again!
Matthieu Faou • 10 Aug 2023
Scams, Cybercrime, Digital Security
Time is money, and online game scammers have lots of it
Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and why would anyone want to target gamers?
Márk Szabó • 07 Aug 2023
Video
Check cybersecurity pre-invest – Week in security with Tony Anscombe
When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules.
Editor • 04 Aug 2023
Digital Security, Privacy
Fingerprints all over: Can browser fingerprinting increase website security?
Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?
Márk Szabó • 03 Aug 2023
Scams, Business Security
The grand theft of Jake Moore’s voice: The concept of a virtual kidnap
With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
Raj Kapoor • 02 Aug 2023
Digital Security, We Live Progress, Privacy
Quantum computing: Will it break crypto security within a few years?
Current cryptographic security methods watch out - quantum computing is coming for your lunch.
Cameron Camp • 01 Aug 2023
Is backdoor access oppressive? – Week in security with Tony Anscombe
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?
Editor • 28 Jul 2023
Internet of Things, Digital Security, Privacy
Gathering dust and data: How robotic vacuums can spy on you
Mitigate the risk of data leaks with a careful review of the product and the proper settings.
Roman Cuprik • 26 Jul 2023
Scams
Dear all, What are some common subject lines in phishing emails?
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.
Roman Cuprik • 25 Jul 2023
What happens if AI is wrong? – Week in security with Tony Anscombe
Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?
Editor • 21 Jul 2023
Borrower beware: Common loan scams and how to avoid them
Kids Online
Cybersecurity starts at home: Help your children stay safe online with open conversations
How To
Lost and found: How to locate your missing devices and more
AceCryptor attacks surge in Europe – Week in security with Tony Anscombe
Top 10 scams targeting seniors – and how to keep your money safe
Sign up for our newsletters