Award-winning news, views, and insight from the ESET security community
ESET Research • 30 Jan 2026 • 11 min. read
ESET Research
DynoWiper update: Technical analysis and attribution
Lukas Stefanko • 28 Jan 2026 • 9 min. read
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
ESET Research • 23 Jan 2026 • 2 min. read
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
MoustachedBouncer: Espionage against foreign diplomats in Belarus
Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again!
Matthieu Faou • 10 Aug 2023
Scams
Cybercrime
Digital Security
Time is money, and online game scammers have lots of it
Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and why would anyone want to target gamers?
Márk Szabó • 07 Aug 2023
Video
Check cybersecurity pre-invest – Week in security with Tony Anscombe
When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules.
Editor • 04 Aug 2023
Privacy
Fingerprints all over: Can browser fingerprinting increase website security?
Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?
Márk Szabó • 03 Aug 2023
The grand theft of Jake Moore’s voice: The concept of a virtual kidnap
With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
Raj Kapoor • 02 Aug 2023
We Live Progress
Quantum computing: Will it break crypto security within a few years?
Current cryptographic security methods watch out - quantum computing is coming for your lunch.
Cameron Camp • 01 Aug 2023
Is backdoor access oppressive? – Week in security with Tony Anscombe
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?
Editor • 28 Jul 2023
Internet of Things
Gathering dust and data: How robotic vacuums can spy on you
Mitigate the risk of data leaks with a careful review of the product and the proper settings.
Roman Cuprik • 26 Jul 2023
Dear all, What are some common subject lines in phishing emails?
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.
Roman Cuprik • 25 Jul 2023
What happens if AI is wrong? – Week in security with Tony Anscombe
Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?
Editor • 21 Jul 2023
8 common work-from-home scams to avoid
That ‘employer’ you’re speaking to may in reality be after your personal information, your money or your help with their illegal activities
Phil Muncaster • 20 Jul 2023
Kids Online
Child identity theft: How do I keep my kids’ personal data safe?
Why is kids’ personal information in high demand, how do criminals steal it, and what can parents do to help prevent child identity theft?
Phil Muncaster • 19 Jul 2023
Sign up for our newsletters