Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Video
Did you mistakenly sell your network access? – Week in security with Tony Anscombe
Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks
Editor • 21 Apr 2023
Linux malware strengthens links between Lazarus and the 3CX supply-chain attack
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
Peter Kálnai and Marc-Etienne M.Léveillé • 20 Apr 2023
Critical Infrastructure, Business Security
The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!
The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents
Márk Szabó • 19 Apr 2023
How To
PC running slow? 10 ways you can speed it up
Before you rush to buy new hardware, try these simple tricks to get your machine up to speed again – and keep it that way.
André Lameiras • 19 Apr 2023
Discarded, not destroyed: Old routers reveal corporate secrets
When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'
Cameron Camp and Tony Anscombe • 18 Apr 2023
Hunting down BlackLotus – Week in security with Tony Anscombe
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
Editor • 14 Apr 2023
Digital Security
Safety first: 5 cybersecurity tips for freelance bloggers
The much-dreaded writer’s block isn’t the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers?
Márk Szabó • 14 Apr 2023
Business Security
What are the cybersecurity concerns of SMBs by sector?
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured
Editor • 12 Apr 2023
10 things to look out for when buying a password manager
Here's how to choose the right password vault for you and what exactly to consider when weighing your options
Phil Muncaster • 11 Apr 2023
Steer clear of tax scams – Week in security with Tony Anscombe
In a rush to file your taxes? Watch out for cybercriminals preying on stressed taxpayers as Tax Day looms large on the horizon.
Editor • 06 Apr 2023
Social Media
Cleaning up your social media and passwords: What to trash and what to treasure
Give your social media presence a good spring scrubbing, audit your passwords and other easy ways to bring order to your digital chaos
Thomas Uhlemann • 06 Apr 2023
Why you should spring clean your home network and audit your backups
Do you know how many devices are connected to your home network? You don’t? This is precisely why it’s time for a network audit.
Thomas Uhlemann • 05 Apr 2023
How to check if your PC has been hacked – and what to do next
Remote Desktop (RDP) Hacking 101: I can see your desktop from here!
eXotic Visit includes XploitSPY malware – Week in security with Tony Anscombe
Scams
Top 10 scams targeting seniors – and how to keep your money safe
Left to their own devices: Security for employees using personal devices for work
Sign up for our newsletters