Latest Articles

Watch out for these traps lurking in search results

Watch out for these traps lurking in search results

Watch out for these traps lurking in search results

Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results

Tomáš Foltýn10 Apr 2025


So your friend has been hacked: Could you be next?

So your friend has been hacked: Could you be next?

So your friend has been hacked: Could you be next?

When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.

Tomáš Foltýn09 Apr 2025


1 billion reasons to protect your identity online

1 billion reasons to protect your identity online

1 billion reasons to protect your identity online

Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.

Phil Muncaster08 Apr 2025


The good, the bad and the unknown of AI: A Q&A with Mária Bieliková

The good, the bad and the unknown of AI: A Q&A with Mária Bieliková

The good, the bad and the unknown of AI: A Q&A with Mária Bieliková

The computer scientist and AI researcher shares her thoughts on the technology’s potential and pitfalls – and what may lie ahead for us

Guest Author03 Apr 2025


This month in security with Tony Anscombe – March 2025 edition

This month in security with Tony Anscombe – March 2025 edition

This month in security with Tony Anscombe – March 2025 edition

From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it's a wrap on another month filled with impactful cybersecurity news

Editor31 Mar 2025


Resilience in the face of ransomware: A key to business survival

Resilience in the face of ransomware: A key to business survival

Resilience in the face of ransomware: A key to business survival

Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage

Tomáš Foltýn31 Mar 2025


Making it stick: How to get the most out of cybersecurity training

Making it stick: How to get the most out of cybersecurity training

Making it stick: How to get the most out of cybersecurity training

Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will kick in when a danger is near

Tomáš Foltýn28 Mar 2025


RansomHub affiliates linked to rival RaaS gangs

RansomHub affiliates linked to rival RaaS gangs

RansomHub affiliates linked to rival RaaS gangs

ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR security solutions

Editor27 Mar 2025


FamousSparrow resurfaces to spy on targets in the US, Latin America

FamousSparrow resurfaces to spy on targets in the US, Latin America

FamousSparrow resurfaces to spy on targets in the US, Latin America

Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first time

Editor27 Mar 2025


Shifting the sands of RansomHub’s EDRKillShifter

Shifting the sands of RansomHub’s EDRKillShifter

Shifting the sands of RansomHub’s EDRKillShifter

ESET researchers discover new ties between affiliates of RansomHub and of rival gangs Medusa, BianLian, and Play

Jakub Souček and Jan Holman26 Mar 2025


You will always remember this as the day you finally caught FamousSparrow

You will always remember this as the day you finally caught FamousSparrow

You will always remember this as the day you finally caught FamousSparrow

ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor, SparrowDoor

Alexandre Côté Cyr26 Mar 2025


Operation FishMedley

Operation FishMedley

Operation FishMedley

ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON

Matthieu Faou20 Mar 2025


Apt Activity Report
MDR Protection