Latest Articles

ESET Threat Report H2 2024

ESET Threat Report H2 2024

ESET Threat Report H2 2024

A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč16 Dec 2024


Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow

Tony Anscombe13 Dec 2024


Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems

Tony Anscombe13 Dec 2024


Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?

Tony Anscombe12 Dec 2024


How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats?

Editor10 Dec 2024


Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost

Phil Muncaster09 Dec 2024


Philip Torr: AI to the people | Starmus highlights

Philip Torr: AI to the people | Starmus highlights

Philip Torr: AI to the people | Starmus highlights

We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact

Tomáš Foltýn05 Dec 2024


Achieving cybersecurity compliance in 5 steps

Achieving cybersecurity compliance in 5 steps

Achieving cybersecurity compliance in 5 steps

Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements

Márk Szabó03 Dec 2024


Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights

Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights

Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights

ESET's CEO unpacks the complexities of cybersecurity in today’s hyper-connected world and highlights the power of innovation in stopping digital threats in their tracks

Tomáš Foltýn02 Dec 2024


Month in security with Tony Anscombe – November 2024 edition

Month in security with Tony Anscombe – November 2024 edition

Month in security with Tony Anscombe – November 2024 edition

Zero days under attack, a new advisory from 'Five Eyes', thousands of ICS units left exposed, and mandatory MFA for all – it's a wrap on another month filled with impactful cybersecurity news

Editor29 Nov 2024


Scams to look out for this holiday season

Scams to look out for this holiday season

Scams to look out for this holiday season

‘Tis the season to be wary – be on your guard and don’t let fraud ruin your shopping spree

Phil Muncaster28 Nov 2024


Bootkitty marks a new chapter in the evolution of UEFI threats

Bootkitty marks a new chapter in the evolution of UEFI threats

Bootkitty marks a new chapter in the evolution of UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats

Editor27 Nov 2024


Apt Activity Report
MDR Protection