Award-winning news, views, and insight from the ESET security community
ESET Research • 30 Jan 2026 • 11 min. read
ESET Research
DynoWiper update: Technical analysis and attribution
Lukas Stefanko • 28 Jan 2026 • 9 min. read
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
ESET Research • 23 Jan 2026 • 2 min. read
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Under lock and key: Safeguarding business data with encryption
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
Phil Muncaster • 05 Sep 2025
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
Fernando Tavella • 04 Sep 2025
Video
This month in security with Tony Anscombe – August 2025 edition
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
Editor • 28 Aug 2025
Kids Online
Don’t let “back to school” become “back to (cyber)bullying”
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
Phil Muncaster • 27 Aug 2025
First known AI-powered ransomware uncovered by ESET Research
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
Anton Cherepanov and Peter Strýček • 26 Aug 2025
"What happens online stays online" and other cyberbullying myths, debunked
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
Phil Muncaster • 21 Aug 2025
The need for speed: Why organizations are turning to rapid, trustworthy MDR
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
Phil Muncaster • 19 Aug 2025
Scams
Investors beware: AI-powered financial scams swamp social media
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
Phil Muncaster • 18 Aug 2025
Supply-chain dependencies: Check your resilience blind spot
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
Tony Anscombe • 12 Aug 2025
How the always-on generation can level up its cybersecurity game
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
Phil Muncaster • 12 Aug 2025
WinRAR zero-day exploited in espionage attacks against high-value targets
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
Editor • 11 Aug 2025
Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
Anton Cherepanov, Peter Strýček, Damien Schaeffer • 11 Aug 2025
Sign up for our newsletters