Award-winning news, views, and insight from the ESET security community
ESET Research • 02 Dec 2025 • 20 min. read
ESET Research
MuddyWater: Snakes by the riverbank
Facundo Muñoz and Dávid Gábriš • 19 Nov 2025 • 9 min. read
PlushDaemon compromises network devices for adversary-in-the-middle attacks
Peter Kálnai and Alexis Rapin • 23 Oct 2025 • 12 min. read
Gotta fly: Lazarus targets the UAV sector
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Kids Online
5 common scams targeting teens – and how to stay safe
From knock-off designer products to too-good-to-be-true job offers, here are five common schemes fraudsters use to trick teenagers out of their money and sensitive data
Amer Owaida • 01 Jun 2021
How To
Don’t feed the trolls and other tips for avoiding online drama
You may not be able to escape internet trolls, but you have a choice about how you will deal with them – here’s how you can handle trolls without losing your cool
Amer Owaida • 31 May 2021
Video
Week in security with Tony Anscombe
You, too, may be vulnerable to SIM swap attacks – How to defend yourself against rom-cons – Zero day in macOS allowed malware to take secret screenshots
Editor • 28 May 2021
Scams
I hacked my friend’s website after a SIM swap attack
Here’s how easily your phone number could be stolen, why a successful SIM swap scam is only the beginning of your problems, and how you can avoid becoming a victim of the attack
Jake Moore • 27 May 2021
Digital Security
Bluetooth bugs could allow attackers to impersonate devices
Patches to remedy the vulnerabilities should be released over the coming weeks
Amer Owaida • 26 May 2021
Apple fixes macOS zero-day bug that let malware take secret screenshots
You would do well to update to macOS Big Sur 11.4 post-haste
Amer Owaida • 25 May 2021
Rom-con: How romance fraud targets older people – and how to stay safe
Online dating scams often follow the same script – here’s what senior citizens should watch out for and how their younger relatives can help them avoid falling victim
Amer Owaida • 24 May 2021
How stalkerware puts the stalkers' own data at risk – Watch out for FluBot – Building security into critical infrastructure
Editor • 21 May 2021
Privacy
Android 12 will give you more control over how much data you share with apps
An all-new privacy dashboard and better location, microphone and camera controls are all aimed at curbing apps’ data-slurping habits
Amer Owaida • 20 May 2021
Critical Infrastructure
Colonial Pipeline attack: Hacking the physical world
The attack is a reminder of growing cyberthreats to critical infrastructure while also showing why providers of essential services are ripe targets for cybercriminals
Cameron Camp • 19 May 2021
Cybercrime
Scams target families of missing persons, FBI warns
Con artists use social media to find and target victims for various nefarious ends, including to extort relatives of missing persons
Amer Owaida • 18 May 2021
Mobile Security
Take action now – FluBot malware may be on its way
Why FluBot is a major threat for Android users, how to avoid falling victim, and how to get rid of the malware if your device has already been compromised
Tony Anscombe • 17 May 2021
Sign up for our newsletters