Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
How To
Avoiding the shopping blues: How to shop online safely this holiday season
With the holiday shopping bonanza right around the corner, here's how to make sure your online spending spree is safe
Amer Owaida • 24 Nov 2021
Critical Infrastructure, Business Security
FBI, CISA urge organizations to be on guard for attacks during holidays
Threat actors have previously timed ransomware and other attacks to coincide with holidays and weekends
Amer Owaida • 23 Nov 2021
What to do if you receive a data breach notice
Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed
Phil Muncaster • 22 Nov 2021
Video
Week in security with Tony Anscombe
ESET discovers watering hole attacks in the Middle East – Getting your life back on track after identity theft – How foreign influence operations have evolved
Editor • 19 Nov 2021
Digital Security
CYBERWARCON – Foreign influence operations grow up
Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks.
Cameron Camp • 19 Nov 2021
Business Security
US Government declassifies data to foster would-be defenders
US Government declassifies cybersecurity subjects they want you to learn about, and is hoping to pay you to learn them
Cameron Camp • 18 Nov 2021
Cybercrime
‘My bank account was in shambles’: The ordeal of an identity theft victim
A victim of identity theft tells us how criminals used his identity to commit fraud and what it took to put his life back in order
David Tsrouya • 18 Nov 2021
Strategic web compromises in the Middle East with a pinch of Candiru
ESET researchers have discovered strategic web compromise (aka watering hole) attacks against high-profile websites in the Middle East
Matthieu Faou • 16 Nov 2021
FBI systems compromised to send out fake attack alerts
Hackers break into the Bureau’s email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks
Amer Owaida • 15 Nov 2021
Steps to take right after a data breach – What to consider before going passwordless – 7 million people hit by Robinhood data breach
Editor • 12 Nov 2021
When the alarms go off: 10 key steps to take after a data breach
It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a breach
Phil Muncaster • 11 Nov 2021
Google scores big win as court blocks iPhone tracking lawsuit
The tech giant wins an appeal against a claim that it unlawfully collected personal data of millions of iPhone users
Amer Owaida • 10 Nov 2021
Jumping the air gap: 15 years of nation-state effort
Rom-con: How romance fraud targets older people – and how to stay safe
Fake or Fake: Keeping up with OceanLotus decoys
Ransomware
RoT: Ransomware of Things
Scams, Cybercrime, Digital Security
Time is money, and online game scammers have lots of it
Sign up for our newsletters