Award-winning news, views, and insight from the ESET security community
Jakub Kaloč • 20 Mar 2024 • 8 min. read
ESET Research
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Matthieu Faou • 21 Feb 2024 • 11 min. read
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
Business Security, Digital Security
Delivering trust with DNS security
Digital Security
Deepfakes in the global election year of 2024: A weapon of mass deception?
Business Security
5 reasons why GDPR was a milestone for data protection
The landmark regulation changed everyone’s mindset on how companies worldwide collect and use the personal data of EU citizens
André Lameiras • 25 May 2022
Scams
Common NFT scams and how to avoid them
As NFTs exploded in popularity, scammers also jumped on the hype. Watch out for counterfeit NFTs, rug pulls, pump-and-dumps and other common scams plaguing the industry.
Mario Micucci • 23 May 2022
Video
Cryptocurrency: secure or not? – Week in security with Tony Anscombe
When you hear the term ‘cryptocurrency’, does ‘secure’ also spring to mind? Here are some implications of the lack of sound security practices in the world of crypto.
Editor • 20 May 2022
Ukraine Crisis – Digital Security Resource Center
Sandworm uses a new version of ArguePatch to attack targets in Ukraine
ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks
The flip side of the coin: Why crypto is catnip for criminals
Cybercriminals continue to mine for opportunities in the crypto space – here's what you should know about coin-mining hacks and crypto theft
Thomas Uhlemann • 19 May 2022
Fake news – why do people believe it?
In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real
André Lameiras • 18 May 2022
Ransomware
The downside of ‘debugging’ ransomware
The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code
Cameron Camp and Aryeh Goretsky • 16 May 2022
How to spot and avoid a phishing attack – Week in security with Tony Anscombe
Can you spot the tell-tale signs of a phishing attempt and check if an email that has landed in your inbox is legit?
Editor • 13 May 2022
10 reasons why we fall for scams
The ‘it won’t happen to me’ mindset leaves you unprepared – here are some common factors that put any of us at risk of online fraud
André Lameiras • 12 May 2022
We Live Progress, Business Security
Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap
What can organizations do to capitalize on the current fluidity in the job market in order to bring fresh cybersecurity talent into the fold?
Phil Muncaster • 11 May 2022
Common LinkedIn scams: Beware of phishing attacks and fake job offers
LinkedIn scammers attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling victim to fraud when using the platform
André Lameiras • 09 May 2022
Defending against APT attacks – Week in security with Tony Anscombe
The conflict in Ukraine has highlighted the risks of cyberespionage attacks that typically involve Advanced Persistent Threat groups and often target organizations' most valuable data
Editor • 06 May 2022
OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes
Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?
Navigating the security and privacy challenges of large language models
BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps
We Live Progress
5 valuable skills your children can learn by playing video games
Sign up for our newsletters