Award-winning news, views, and insight from the ESET security community
Jean-Ian Boutin • 19 May 2025 • 3 min. read
ESET Research
Threat Reports
ESET APT Activity Report Q4 2024–Q1 2025
Matthieu Faou • 15 May 2025 • 18 min. read
Operation RoundPress
Facundo Muñoz • 30 Apr 2025 • 11 min. read
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Scams
Top 10 Venmo scams: Don't fall for these common tricks
Here's what to know about some of the most common ploys that scammers use on the payment app
Phil Muncaster • 17 Jan 2023
We Live Progress
Hybrid commerce: Blurring the lines between business and pleasure
It is now acceptable to find a job on a dating app!
André Lameiras • 16 Jan 2023
Video
APT group trojanizes Telegram app – Week in security with Tony Anscombe
StrongPity's backdoor is fitted with various spying features and can record phone calls, collect texts, and gather call logs and contact lists
Editor • 13 Jan 2023
Introducing IPyIDA: A Python plugin for your reverse-engineering toolkit
ESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter Notebook into IDA
Rene Holt • 12 Jan 2023
Digital Security
Now you can legally repair your tech – sort of
A new law portends a future where (we hope) it will be easier for us all to repair, fix, upgrade, and just tinker with things we already own
Cameron Camp • 11 Jan 2023
StrongPity espionage campaign targeting Android users
ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version
Lukas Stefanko • 10 Jan 2023
Secure Coding
Cracked it! Highlights from KringleCon 5: Golden Rings
Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings
Rene Holt • 09 Jan 2023
COVID-19
Hybrid work: Turning business platforms into preferred social spaces
Hybrid work and hybrid play now merge into hybrid living, but where is the line between the two? Is there one?
Alžbeta Kovaľová • 09 Jan 2023
Ransomware target list – Week in security with Tony Anscombe
Why schools, hospitals, local governments and other public sector organizations are in a sweet spot for ransomware attacks
Editor • 05 Jan 2023
Privacy
The doctor will see you now … virtually: Tips for a safe telehealth visit
Are your virtual doctor visits private and secure? Here’s what to know about, and how to prepare for, connecting with a doctor from the comfort of your home.
Phil Muncaster • 04 Jan 2023
Kids Online
Gaming: How much is too much for our children?
With many children spending a little too much time playing video games, learn to spot the signs that things may be spinning out of control
Phil Muncaster • 03 Jan 2023
The world’s most common passwords: What to do if yours is on the list
Do you use any of these extremely popular – and eminently hackable – passwords? If so, we have a New Year’s resolution for you.
Phil Muncaster • 02 Jan 2023
Sign up for our newsletters