Latest Articles

Under lock and key: Safeguarding business data with encryption

Under lock and key: Safeguarding business data with encryption

Under lock and key: Safeguarding business data with encryption

As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose

Phil Muncaster05 Sep 2025


GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results

Fernando Tavella04 Sep 2025


This month in security with Tony Anscombe – August 2025 edition

This month in security with Tony Anscombe – August 2025 edition

This month in security with Tony Anscombe – August 2025 edition

From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news

Editor28 Aug 2025


Don’t let “back to school” become “back to (cyber)bullying”

Don’t let “back to school” become “back to (cyber)bullying”

Don’t let “back to school” become “back to (cyber)bullying”

Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back

Phil Muncaster27 Aug 2025


First known AI-powered ransomware uncovered by ESET Research

First known AI-powered ransomware uncovered by ESET Research

First known AI-powered ransomware uncovered by ESET Research

The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats

Anton Cherepanov and Peter Strýček26 Aug 2025


"What happens online stays online" and other cyberbullying myths, debunked

"What happens online stays online" and other cyberbullying myths, debunked

"What happens online stays online" and other cyberbullying myths, debunked

Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.

Phil Muncaster21 Aug 2025


The need for speed: Why organizations are turning to rapid, trustworthy MDR

The need for speed: Why organizations are turning to rapid, trustworthy MDR

The need for speed: Why organizations are turning to rapid, trustworthy MDR

How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries

Phil Muncaster19 Aug 2025


Investors beware: AI-powered financial scams swamp social media

Investors beware: AI-powered financial scams swamp social media

Investors beware: AI-powered financial scams swamp social media

Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.

Phil Muncaster18 Aug 2025


Supply-chain dependencies: Check your resilience blind spot

Supply-chain dependencies: Check your resilience blind spot

Supply-chain dependencies: Check your resilience blind spot

Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?

Tony Anscombe12 Aug 2025


How the always-on generation can level up its cybersecurity game

How the always-on generation can level up its cybersecurity game

How the always-on generation can level up its cybersecurity game

Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think

Phil Muncaster12 Aug 2025


WinRAR zero-day exploited in espionage attacks against high-value targets

WinRAR zero-day exploited in espionage attacks against high-value targets

WinRAR zero-day exploited in espionage attacks against high-value targets

The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds

Editor11 Aug 2025


Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability

Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability

Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability

ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets

Anton Cherepanov, Peter Strýček, Damien Schaeffer11 Aug 2025


Apt Activity Report
MDR Protection