Award-winning news, views, and insight from the ESET security community
Jakub Kaloč • 20 Mar 2024 • 8 min. read
ESET Research
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Matthieu Faou • 21 Feb 2024 • 11 min. read
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
Business Security, Digital Security
Delivering trust with DNS security
Digital Security
Deepfakes in the global election year of 2024: A weapon of mass deception?
Video
Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe
What are some of the key cybersecurity trends that people and organizations should have on their radars this year?
Editor • 05 Jan 2024
How To
Lost and found: How to locate your missing devices and more
Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy
Márk Szabó • 04 Jan 2024
Privacy
Say what you will? Your favorite speech-to-text app may be a privacy risk
Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets.
Martina López • 03 Jan 2024
A year in review: 10 of the biggest security incidents of 2023
As we draw the curtain on another eventful year in cybersecurity, let’s review some of the high-profile cyber-incidents that befell various organizations this year
Phil Muncaster • 28 Dec 2023
Got a new device? 7 things to do before disposing of your old tech
Before getting rid of your no-longer-needed device, make sure it doesn’t contain any of your personal documents or information
Phil Muncaster • 27 Dec 2023
Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe
How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET's latest Threat Report
Editor • 22 Dec 2023
Safeguard the joy: 10 tips for securing your shiny new device
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly
Phil Muncaster • 21 Dec 2023
Mobile Security
These aren’t the Androids you should be looking for
You may get more than you bargained for when you buy a budget-friendly smartphone and forgo safeguards baked into Google Play
Roman Cuprik and Thomas Uhlemann • 20 Dec 2023
ESET Research, Threat Reports
ESET Threat Report H2 2023
A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Jiří Kropáč • 19 Dec 2023
ESET Research Podcast: Neanderthals, Mammoths and Telekopye
ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces
ESET Research • 18 Dec 2023
New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe
Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes
Editor • 15 Dec 2023
OilRig’s persistent attacks using cloud service-powered downloaders
ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications
Zuzana Hromcová and Adam Burgher • 14 Dec 2023
How to share sensitive files securely online
NSPX30: A sophisticated AitM-enabled implant evolving since 2005
How I hacked my friend’s PayPal account
Business Security, Secure Coding
Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses
Sign up for our newsletters