Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
A pernicious potpourri of Python packages in PyPI
The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository
Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023
We Live Progress
Black Hat Europe 2023: Should we regulate AI?
ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past?
Tony Anscombe • 11 Dec 2023
Mobile Security
Silent but deadly: The rise of zero-click attacks
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.
Márk Szabó • 11 Dec 2023
Video
Surge in deceptive loan apps – Week in security with Tony Anscombe
ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi.
Editor • 08 Dec 2023
Critical Infrastructure
Black Hat Europe 2023: The past could return to haunt you
Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.
Tony Anscombe • 08 Dec 2023
Digital Security
To tap or not to tap: Are NFC payments safer?
Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods?
Márk Szabó • 07 Dec 2023
Navigating privacy: Should we put the brakes on car tracking?
Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable?
Márk Szabó • 06 Dec 2023
Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths
ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play
Lukas Stefanko • 05 Dec 2023
Teaching appropriate use of AI tech – Week in security with Tony Anscombe
Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology
Editor • 01 Dec 2023
Business Security
Executives behaving badly: 5 ways to manage the executive cyberthreat
Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk
Phil Muncaster • 30 Nov 2023
Very precisely lost – GPS jamming
The technology is both widely available and well developed, hence it's also poised to proliferate – especially in the hands of those wishing ill
Cameron Camp • 29 Nov 2023
Retail at risk: Top threats facing retailers this holiday season
While it may be too late to introduce wholesale changes to your security policies, it doesn’t hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them
Phil Muncaster • 28 Nov 2023
Can your iPhone be hacked? What to know about iOS security
ESET Research, Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center
Industroyer2: Industroyer reloaded
ESET Research, Ukraine Crisis – Digital Security Resource Center
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
Scams
4 common ways scammers use celebrity names to lure victims
Cash App fraud: 10 common scams to watch out for
Sign up for our newsletters