Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
Gelsemium: When threat actors go gardening
ESET researchers shed light on new campaigns from the quiet Gelsemium group
Matthieu Faou and Thomas Dupuy • 09 Jun 2021
Cybercrime
Hundreds of suspected criminals arrested after being tricked into using FBI‑run chat app
Law enforcement around the world used a messaging app called AN0M to monitor the communications of alleged criminals
Amer Owaida • 08 Jun 2021
Digital Security
Hacking space: How to pwn a satellite
Hacking an orbiting satellite is not light years away – here’s how things can go wrong in outer space
Cameron Camp • 07 Jun 2021
Video
Week in security with Tony Anscombe
New ESET Threat Report is out – How to deal with online trolls – Teens, beware these 5 common scams
Editor • 04 Jun 2021
Zero-day in popular WordPress plugin exploited to take over websites
Websites using Fancy Product Designer are susceptible to remote code execution attacks even if the plugin is deactivated
Amer Owaida • 03 Jun 2021
Threat Reports, ESET Research
ESET Threat Report T1 2021
A view of the T1 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Roman Kováč • 03 Jun 2021
Kids Online
5 common scams targeting teens – and how to stay safe
From knock-off designer products to too-good-to-be-true job offers, here are five common schemes fraudsters use to trick teenagers out of their money and sensitive data
Amer Owaida • 01 Jun 2021
How To
Don’t feed the trolls and other tips for avoiding online drama
You may not be able to escape internet trolls, but you have a choice about how you will deal with them – here’s how you can handle trolls without losing your cool
Amer Owaida • 31 May 2021
You, too, may be vulnerable to SIM swap attacks – How to defend yourself against rom-cons – Zero day in macOS allowed malware to take secret screenshots
Editor • 28 May 2021
Scams
I hacked my friend’s website after a SIM swap attack
Here’s how easily your phone number could be stolen, why a successful SIM swap scam is only the beginning of your problems, and how you can avoid becoming a victim of the attack
Jake Moore • 27 May 2021
Bluetooth bugs could allow attackers to impersonate devices
Patches to remedy the vulnerabilities should be released over the coming weeks
Amer Owaida • 26 May 2021
Apple fixes macOS zero-day bug that let malware take secret screenshots
You would do well to update to macOS Big Sur 11.4 post-haste
Amer Owaida • 25 May 2021
IISerpent: Malware-driven SEO fraud as a service
Operation StealthyTrident: corporate software under attack
What is a password manager and why is it useful?
Buhtrap backdoor and Buran ransomware distributed via major advertising platform
Readers of popular websites targeted by stealthy Stegano exploit kit hiding in pixels of malicious ads
Sign up for our newsletters