Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Threat Reports, ESET Research
ESET APT Activity Report Q4 2022–Q1 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023
Jean-Ian Boutin • 09 May 2023
Ukraine Crisis – Digital Security Resource Center, Business Security
How the war in Ukraine has been a catalyst in private-public collaborations
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
André Lameiras • 09 May 2023
Video
APTs target MSP access to customer networks – Week in security with Tony Anscombe
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
Editor • 05 May 2023
Digital Security, Business Security
Creating strong, yet user-friendly passwords: Tips for your business password policy
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization
Roman Cuprik • 04 May 2023
Social Media
Using Discord? Don’t play down its privacy and security risks
It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut
Márk Szabó • 03 May 2023
Digital Security
APT groups muddying the waters for MSPs
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers
James Shepperd • 02 May 2023
What was hot at RSA Conference 2023? – Week in security with Tony Anscombe
The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated
Editor • 28 Apr 2023
RSA Conference 2023 – How AI will infiltrate the world
As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications
Cameron Camp • 26 Apr 2023
Evasive Panda APT group delivers malware via updates for popular Chinese software
ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software
Facundo Muñoz • 26 Apr 2023
Did you mistakenly sell your network access? – Week in security with Tony Anscombe
Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks
Editor • 21 Apr 2023
Linux malware strengthens links between Lazarus and the 3CX supply-chain attack
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
Peter Kálnai and Marc-Etienne M.Léveillé • 20 Apr 2023
Critical Infrastructure, Business Security
The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!
The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents
Márk Szabó • 19 Apr 2023
Threat intelligence explained | Unlocked 403: A cybersecurity podcast
Cybercrime
The art of digital sleuthing: How digital forensics unlocks the truth
Secure Coding
Capture the flag: 5 websites to sharpen your hacking skills
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
5 free OSINT tools for social media
Sign up for our newsletters