Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 19 Feb 2026 • 13 min. read
ESET Research
PromptSpy ushers in the era of Android threats using GenAI
ESET Research • 30 Jan 2026 • 11 min. read
DynoWiper update: Technical analysis and attribution
Lukas Stefanko • 28 Jan 2026 • 9 min. read
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Kids Online
Children and chatbots: What parents should know
As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development
Phil Muncaster • 23 Jan 2026
Scams
Common Apple Pay scams, and how to stay safe
Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
Phil Muncaster • 22 Jan 2026
Digital Security
Old habits die hard: 2025’s most common passwords were as predictable as ever
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
Christian Ali Bravo • 20 Jan 2026
Social Media
Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.
Phil Muncaster • 16 Jan 2026
Is it time for internet services to adopt identity verification?
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
Tony Anscombe • 14 Jan 2026
Privacy
Your personal information is on the dark web. What happens next?
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
Phil Muncaster • 13 Jan 2026
Credential stuffing: What it is and how to protect yourself
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts
Christian Ali Bravo • 08 Jan 2026
Video
This month in security with Tony Anscombe – December 2025 edition
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year
Editor • 29 Dec 2025
A brush with online fraud: What are brushing scams and how do I stay safe?
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
Phil Muncaster • 23 Dec 2025
Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
Romain Dumont • 22 Dec 2025
LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions
Anton Cherepanov and Peter Strýček • 18 Dec 2025
ESET Threat Report H2 2025
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Jiří Kropáč • 16 Dec 2025
Sign up for our newsletters