Award-winning news, views, and insight from the ESET security community
ESET Research • 12 Jul 2023 • 1 min. read
ESET Research
ESET Research Podcast: Finding the mythical BlackLotus bootkit
Jakub Kaloč • 06 Jul 2023 • 10 min. read
What’s up with Emotet?
Lukas Stefanko • 15 Jun 2023 • 7 min. read
Android GravityRAT goes after WhatsApp backups
Dear all, What are some common subject lines in phishing emails?
Employee monitoring: Is ‘bossware’ right for your company?
The real cost of a free lunch – Week in security with Tony Anscombe
Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for
Editor • 19 May 2023
Top 5 search engines for internet-connected devices and services
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
Camilo Gutiérrez Amaya • 18 May 2023
Meet “AI”, your new colleague: could it expose your company's secrets?
Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk
Roman Cuprik • 17 May 2023
You may not care where you download software from, but malware does
Why do people still download files from sketchy places and get compromised as a result?
Aryeh Goretsky • 16 May 2023
Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
Editor • 12 May 2023
Why you need parental control software – and 5 features to look for
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
Phil Muncaster • 12 May 2023
Turning on stealth mode: 5 simple strategies for staying under the radar online
Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details
André Lameiras • 10 May 2023
ESET APT Activity Report Q4 2022–Q1 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023
Jean-Ian Boutin • 09 May 2023
How the war in Ukraine has been a catalyst in private-public collaborations
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
André Lameiras • 09 May 2023
APTs target MSP access to customer networks – Week in security with Tony Anscombe
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
Editor • 05 May 2023
Creating strong, yet user-friendly passwords: Tips for your business password policy
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization
Roman Cuprik • 04 May 2023
Using Discord? Don’t play down its privacy and security risks
It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut
Márk Szabó • 03 May 2023
Sign up for our newsletters