Award-winning news, views, and insight from the ESET security community
Jakub Kaloč • 20 Mar 2024 • 8 min. read
ESET Research
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Matthieu Faou • 21 Feb 2024 • 11 min. read
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
Business Security, Digital Security
Delivering trust with DNS security
Digital Security
Deepfakes in the global election year of 2024: A weapon of mass deception?
Scams
Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys
Roman Cuprik • 30 May 2023
Video
How an innocuous app morphed into a trojan – Week in security with Tony Anscombe
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
Editor • 26 May 2023
Shedding light on AceCryptor and its operation
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families
Jakub Kaloč • 25 May 2023
Digital Security, Business Security
Digital security for the self-employed: Staying safe without an IT team to help
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business
Phil Muncaster • 24 May 2023
Android app breaking bad: From legitimate screen recording to file exfiltration within a year
ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio
Lukas Stefanko • 23 May 2023
The real cost of a free lunch – Week in security with Tony Anscombe
Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for
Editor • 19 May 2023
Top 5 search engines for internet-connected devices and services
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
Camilo Gutiérrez Amaya • 18 May 2023
Meet “AI”, your new colleague: could it expose your company's secrets?
Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk
Roman Cuprik • 17 May 2023
You may not care where you download software from, but malware does
Why do people still download files from sketchy places and get compromised as a result?
Aryeh Goretsky • 16 May 2023
Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
Editor • 12 May 2023
Kids Online
Why you need parental control software – and 5 features to look for
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
Phil Muncaster • 12 May 2023
Privacy
Turning on stealth mode: 5 simple strategies for staying under the radar online
Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details
André Lameiras • 10 May 2023
Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe
Mobile Security
These aren’t the Androids you should be looking for
Grandoreiro banking malware disrupted – Week in security with Tony Anscombe
Say what you will? Your favorite speech-to-text app may be a privacy risk
Sign up for our newsletters