Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Digital Security, Business Security
Cyber: The Swiss army knife of tradecraft
In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike
Andy Garth • 29 Jan 2024
Video
Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe
The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UK
Editor • 26 Jan 2024
Business Security
Assessing and mitigating supply chain cybersecurity risks
Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management
Phil Muncaster • 25 Jan 2024
NSPX30: A sophisticated AitM-enabled implant evolving since 2005
ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group we have named Blackwood
Facundo Muñoz • 24 Jan 2024
Scams
Break the fake: The race is on to stop AI voice cloning scams
As AI-powered voice cloning turbocharges imposter scams, we sit down with ESET’s Jake Moore to discuss how to hang up on ‘hi-fi’ scam calls – and what the future holds for deepfake detection
Cameron Camp • 23 Jan 2024
Why many CISOs consider quitting – Week in security with Tony Anscombe
The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings
Editor • 19 Jan 2024
Virtual kidnapping: How to see through this terrifying scam
Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims
Phil Muncaster • 18 Jan 2024
Scams, Digital Security
Is Temu safe? What to know before you ‘shop like a billionaire’
Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal
Phil Muncaster • 17 Jan 2024
The 7 deadly cloud security sins – and how SMBs can do things better
By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk
Phil Muncaster • 16 Jan 2024
Lessons from SEC's X account hack – Week in security with Tony Anscombe
The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFs
Editor • 12 Jan 2024
A peek behind the curtain: How are sock puppet accounts used in OSINT?
How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks
Mario Micucci • 11 Jan 2024
Mobile Security
Attack of the copycats: How fake messaging apps and app mods could bite you
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride.
Phil Muncaster • 10 Jan 2024
Digital Security
Everything you need to know about IP grabbers
How To
PC running slow? 10 ways you can speed it up
Common WhatsApp scams and how to avoid them
How to tell if your phone has been hacked
Top 10 Venmo scams: Don't fall for these common tricks
Sign up for our newsletters