Latest Articles

How to spot malicious spam – Week in security with Tony Anscombe

How to spot malicious spam – Week in security with Tony Anscombe

How to spot malicious spam – Week in security with Tony Anscombe

As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam

Editor17 Jun 2022


How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?

Rene Holt16 Jun 2022


Industroyer: A cyber-weapon that brought down a power grid

Industroyer: A cyber-weapon that brought down a power grid

Industroyer: A cyber-weapon that brought down a power grid

Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids

André Lameiras13 Jun 2022


3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe

3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe

3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe

Here are three themes that stood out at the world's largest gathering of cybersecurity professionals

Editor10 Jun 2022


RSA – APIs, your organization’s dedicated backdoors

RSA – APIs, your organization’s dedicated backdoors

RSA – APIs, your organization’s dedicated backdoors

API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly

Cameron Camp10 Jun 2022


RSA – Creepy real-world edition

RSA – Creepy real-world edition

RSA – Creepy real-world edition

Digital fiddling somehow got mixed up in a real war

Cameron Camp09 Jun 2022


RSA – Digital healthcare meets security, but does it really want to?

RSA – Digital healthcare meets security, but does it really want to?

RSA – Digital healthcare meets security, but does it really want to?

Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission

Cameron Camp08 Jun 2022


RSA – Spot the real fake

RSA – Spot the real fake

RSA – Spot the real fake

How erring on the side of privacy might ultimately save you from chasing down a virtual rendition of you doing the bidding of a scammer

Cameron Camp07 Jun 2022


Cybersecurity awareness training: What is it and what works best?

Cybersecurity awareness training: What is it and what works best?

Cybersecurity awareness training: What is it and what works best?

Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk

Phil Muncaster07 Jun 2022


Key insights from ESET's latest Threat Report – Week in security with Tony Anscombe

Key insights from ESET's latest Threat Report – Week in security with Tony Anscombe

Key insights from ESET's latest Threat Report – Week in security with Tony Anscombe

A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses

Editor03 Jun 2022


100 days of war in Ukraine: How the conflict is playing out in cyberspace

100 days of war in Ukraine: How the conflict is playing out in cyberspace

100 days of war in Ukraine: How the conflict is playing out in cyberspace

It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict

André Lameiras03 Jun 2022


ESET Threat Report T1 2022

ESET Threat Report T1 2022

ESET Threat Report T1 2022

A view of the T1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Roman Kováč02 Jun 2022


Apt Activity Report
MDR Protection