Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 10 Apr 2024 • 17 min. read
ESET Research
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
Jakub Kaloč • 20 Mar 2024 • 8 min. read
Rescoms rides waves of AceCryptor spam
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024 • 14 min. read
Evasive Panda leverages Monlam Festival to target Tibetans
Business Security, Digital Security
Delivering trust with DNS security
Privacy
7 reasons why cybercriminals want your personal data
COVID-19
Mobile security threats amid COVID-19 and beyond: A Q&A with Lukas Stefanko
ESET malware researcher Lukas Stefanko gives us a peek behind the scenes of his analysis of CryCryptor ransomware and puts the threat into a broader context
Gabrielle Ladouceur Despins • 15 Jul 2020
Welcome Chat as a secure messaging app? Nothing could be further from the truth
ESET research uncovers a malicious operation that both spies on victims and leaks their data
Lukas Stefanko • 14 Jul 2020
Digital Security
Zoom patches zero-day flaw in Windows client
The vulnerability exposed Zoom users running Windows 7 or earlier OS versions to remote attacks
Amer Owaida • 13 Jul 2020
Video
Week in security with Tony Anscombe
Up close with the Evilnum group and its eponymous malware – A severe flaw in networking gear – Router firmware under the microscope
Editor • 10 Jul 2020
Popular home routers plagued by critical security flaws
A study paints a dim picture of router security, as none of the 127 devices tested was free of severe vulnerabilities
Tomáš Foltýn • 09 Jul 2020
Cybercrime
Billions of stolen passwords for sale on the dark web
While logins to music and video streaming services sell for less than ten dollars each, domain admin access is being offered for US$120,000
Amer Owaida • 09 Jul 2020
More evil: A deep look at Evilnum and its toolset
ESET research gives a detailed picture of the operations of the Evilnum group and its toolkit deployed in attacks against carefully chosen targets in the fintech sector
Matías Porolli • 09 Jul 2020
Attackers target critical flaw in popular networking gear
The vulnerability, which received the highest possible severity score, leaves thousands of devices at risk of being taken over by remote attackers. A patch is available.
Amer Owaida • 07 Jul 2020
Kids Online
Raising children in the social media limelight? Pause before you post
How (over)sharing your children’s triumphs and antics with the world may impact their immediate and distant future – and how to reduce the risks of such ‘sharenting’
Scams
Fed shares insight on how to combat synthetic identity fraud
The Federal Reserve looks at ways to counter what is thought to be the fastest-growing type of financial crime in the United States
Amer Owaida • 06 Jul 2020
Brute-force attacks against RDP surge – Is contact tracing the answer to ending the COVID-19 crisis? – Microsoft ships urgent security updates
Editor • 03 Jul 2020
Hundreds arrested after police crack encrypted chat network
European police infiltrate EncroChat, go on to crack down on crime kingpins and seize guns, drugs, cars and millions in cash
Amer Owaida • 03 Jul 2020
ILOVEYOU: The wrong kind of LoveLetter
Internet of Things
10 things to know about the October 21 IoT DDoS attacks
Finland – hope in the fight against cyberbullying
11 security mistakes you probably keep on making
Mobile Security
Apple Pay and security - what you need to know
Sign up for our newsletters