Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Digital Security
You may not care where you download software from, but malware does
Why do people still download files from sketchy places and get compromised as a result?
Aryeh Goretsky • 16 May 2023
Video
Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
Editor • 12 May 2023
Kids Online
Why you need parental control software – and 5 features to look for
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
Phil Muncaster • 12 May 2023
Turning on stealth mode: 5 simple strategies for staying under the radar online
Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details
André Lameiras • 10 May 2023
Threat Reports, ESET Research
ESET APT Activity Report Q4 2022–Q1 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023
Jean-Ian Boutin • 09 May 2023
Ukraine Crisis – Digital Security Resource Center, Business Security
How the war in Ukraine has been a catalyst in private-public collaborations
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
André Lameiras • 09 May 2023
APTs target MSP access to customer networks – Week in security with Tony Anscombe
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
Editor • 05 May 2023
Digital Security, Business Security
Creating strong, yet user-friendly passwords: Tips for your business password policy
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization
Roman Cuprik • 04 May 2023
Social Media
Using Discord? Don’t play down its privacy and security risks
It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut
Márk Szabó • 03 May 2023
APT groups muddying the waters for MSPs
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers
James Shepperd • 02 May 2023
What was hot at RSA Conference 2023? – Week in security with Tony Anscombe
The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated
Editor • 28 Apr 2023
RSA Conference 2023 – How AI will infiltrate the world
As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications
Cameron Camp • 26 Apr 2023
LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
How To
Watching out for the fakes: How to spot online disinformation
Gary McKinnon reveals detail on NASA data breach and ‘extraterrestrial life’
OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes
Scams
5 signs you’ve fallen for a scam – and what to do next
Sign up for our newsletters