Award-winning news, views, and insight from the ESET security community
Jakub Kaloč • 20 Mar 2024 • 8 min. read
ESET Research
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Matthieu Faou • 21 Feb 2024 • 11 min. read
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
Business Security, Digital Security
Delivering trust with DNS security
Digital Security
Deepfakes in the global election year of 2024: A weapon of mass deception?
Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?
Alžbeta Kovaľová • 13 Dec 2023
A pernicious potpourri of Python packages in PyPI
The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository
Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023
We Live Progress
Black Hat Europe 2023: Should we regulate AI?
ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past?
Tony Anscombe • 11 Dec 2023
Mobile Security
Silent but deadly: The rise of zero-click attacks
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.
Márk Szabó • 11 Dec 2023
Video
Surge in deceptive loan apps – Week in security with Tony Anscombe
ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi.
Editor • 08 Dec 2023
Critical Infrastructure
Black Hat Europe 2023: The past could return to haunt you
Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.
Tony Anscombe • 08 Dec 2023
To tap or not to tap: Are NFC payments safer?
Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods?
Márk Szabó • 07 Dec 2023
Privacy
Navigating privacy: Should we put the brakes on car tracking?
Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable?
Márk Szabó • 06 Dec 2023
Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths
ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play
Lukas Stefanko • 05 Dec 2023
Teaching appropriate use of AI tech – Week in security with Tony Anscombe
Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology
Editor • 01 Dec 2023
Business Security
Executives behaving badly: 5 ways to manage the executive cyberthreat
Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk
Phil Muncaster • 30 Nov 2023
Very precisely lost – GPS jamming
The technology is both widely available and well developed, hence it's also poised to proliferate – especially in the hands of those wishing ill
Cameron Camp • 29 Nov 2023
Vulnerabilities in business VPNs under the spotlight
ESET Research, Threat Reports
ESET Threat Report H2 2023
Scams
Common WhatsApp scams and how to avoid them
Can your iPhone be hacked? What to know about iOS security
TikShock: Don’t get caught out by these 5 TikTok scams
Sign up for our newsletters