Award-winning news, views, and insight from the ESET security community
Jiří Kropáč • 16 Dec 2025 • 2 min. read
ESET Research
ESET Threat Report H2 2025
ESET Research • 02 Dec 2025 • 20 min. read
MuddyWater: Snakes by the riverbank
Facundo Muñoz and Dávid Gábriš • 19 Nov 2025 • 9 min. read
PlushDaemon compromises network devices for adversary-in-the-middle attacks
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Gamaredon X Turla collab
Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
Matthieu Faou and Zoltán Rusnák • 19 Sep 2025
Small businesses, big targets: Protecting your business against ransomware
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
Phil Muncaster • 18 Sep 2025
Video
HybridPetya: The Petya/NotPetya copycat comes with a twist
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
Editor • 16 Sep 2025
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal
Martin Smolár • 12 Sep 2025
Are cybercriminals hacking your systems – or just logging in?
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight
Phil Muncaster • 11 Sep 2025
Preventing business disruption and building cyber-resilience with MDR
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
Phil Muncaster • 09 Sep 2025
Under lock and key: Safeguarding business data with encryption
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
Phil Muncaster • 05 Sep 2025
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
Fernando Tavella • 04 Sep 2025
This month in security with Tony Anscombe – August 2025 edition
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
Editor • 28 Aug 2025
Kids Online
Don’t let “back to school” become “back to (cyber)bullying”
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
Phil Muncaster • 27 Aug 2025
First known AI-powered ransomware uncovered by ESET Research
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
Anton Cherepanov and Peter Strýček • 26 Aug 2025
"What happens online stays online" and other cyberbullying myths, debunked
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
Phil Muncaster • 21 Aug 2025
Sign up for our newsletters