Latest Articles

The real cost of a free lunch – Week in security with Tony Anscombe

The real cost of a free lunch – Week in security with Tony Anscombe

The real cost of a free lunch – Week in security with Tony Anscombe

Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for

Editor19 May 2023


Top 5 search engines for internet-connected devices and services

Top 5 search engines for internet-connected devices and services

Top 5 search engines for internet-connected devices and services

A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet

Camilo Gutiérrez Amaya18 May 2023


Meet “AI”, your new colleague: could it expose your company's secrets?

Meet “AI”, your new colleague: could it expose your company's secrets?

Meet “AI”, your new colleague: could it expose your company's secrets?

Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk

Roman Cuprik17 May 2023


You may not care where you download software from, but malware does

You may not care where you download software from, but malware does

You may not care where you download software from, but malware does

Why do people still download files from sketchy places and get compromised as a result?

Aryeh Goretsky16 May 2023


Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe

Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe

Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe

What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?

Editor12 May 2023


Why you need parental control software – and 5 features to look for

Why you need parental control software – and 5 features to look for

Why you need parental control software – and 5 features to look for

Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize

Phil Muncaster12 May 2023


Turning on stealth mode: 5 simple strategies for staying under the radar online

Turning on stealth mode: 5 simple strategies for staying under the radar online

Turning on stealth mode: 5 simple strategies for staying under the radar online

Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details

André Lameiras10 May 2023


ESET APT Activity Report Q4 2022­–Q1 2023

ESET APT Activity Report Q4 2022­–Q1 2023

ESET APT Activity Report Q4 2022­–Q1 2023

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023

Jean-Ian Boutin09 May 2023


How the war in Ukraine has been a catalyst in private-public collaborations

How the war in Ukraine has been a catalyst in private-public collaborations

How the war in Ukraine has been a catalyst in private-public collaborations

As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital

André Lameiras09 May 2023


APTs target MSP access to customer networks – Week in security with Tony Anscombe

APTs target MSP access to customer networks – Week in security with Tony Anscombe

APTs target MSP access to customer networks – Week in security with Tony Anscombe

The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers

Editor05 May 2023


Creating strong, yet user-friendly passwords: Tips for your business password policy

Creating strong, yet user-friendly passwords: Tips for your business password policy

Creating strong, yet user-friendly passwords: Tips for your business password policy

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization

Roman Cuprik04 May 2023


Using Discord? Don’t play down its privacy and security risks

Using Discord? Don’t play down its privacy and security risks

Using Discord? Don’t play down its privacy and security risks

It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut

Márk Szabó03 May 2023


Threat Report
MSP Program