Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Ukraine Crisis – Digital Security Resource Center
A year of wiper attacks in Ukraine
ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022
ESET Research • 24 Feb 2023
WinorDLL64: A backdoor from the vast Lazarus arsenal?
The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group
Vladislav Hrčka • 23 Feb 2023
How To
Writing like a boss: How cybercriminals can use ChatGPT to scam you
It’s never been easier to write a convincing message that can trick you into handing over your money or personal data
Phil Muncaster • 22 Feb 2023
Business Security
ESET SMB Digital Security Sentiment Report: The damaging effects of a breach
SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are breached
Editor • 21 Feb 2023
Malware
Will ChatGPT start writing killer malware?
AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware?
Cameron Camp • 20 Feb 2023
Video
Search ads abused to spread malware – Week in security with Tony Anscombe
Threat actors used search engine ads to impersonate makers of popular software and direct internet users to malicious websites
Editor • 17 Feb 2023
Security amidst a global frost
No longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield
Cameron Camp • 16 Feb 2023
These aren’t the apps you’re looking for: fake installers targeting Southeast and East Asia
ESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT malware, distributed via malicious websites linked in ads that appear in Google search results
Matías Porolli and Fernando Tavella • 16 Feb 2023
Scams
10 signs that scammers have you in their sights
Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing
Phil Muncaster • 15 Feb 2023
We Live Progress
ChatGPT, will you be my Valentine?
Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot that the world has fallen in love with so badly.
André Lameiras • 14 Feb 2023
Confident cybersecurity means fewer headaches for SMBs
Small and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts
Editor • 13 Feb 2023
Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe
What is behind the drop in ransomware and what should still be done for containing the ransomware scourge?
Editor • 10 Feb 2023
Break the fake: The race is on to stop AI voice cloning scams
Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths
Social Media
Fake friends and followers on social media – and how to spot them
What is AI, really? | Unlocked 403: A cybersecurity podcast
Love is in the AI: Finding love online takes on a whole new meaning
Sign up for our newsletters