Award-winning news, views, and insight from the ESET security community
ESET Research • 30 Jan 2026 • 11 min. read
ESET Research
DynoWiper update: Technical analysis and attribution
Lukas Stefanko • 28 Jan 2026 • 9 min. read
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
ESET Research • 23 Jan 2026 • 2 min. read
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Video
This month in security with Tony Anscombe – January 2026 edition
The trends that emerged in January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year
Editor • 30 Jan 2026
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector
ESET Research • 30 Jan 2026
ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
Lukas Stefanko • 28 Jan 2026
Digital Security
Drowning in spam or scam emails? Here’s probably why
Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.
Phil Muncaster • 27 Jan 2026
The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper
ESET Research • 23 Jan 2026
Kids Online
Children and chatbots: What parents should know
As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development
Phil Muncaster • 23 Jan 2026
Scams
Common Apple Pay scams, and how to stay safe
Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
Phil Muncaster • 22 Jan 2026
Old habits die hard: 2025’s most common passwords were as predictable as ever
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
Christian Ali Bravo • 20 Jan 2026
Social Media
Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.
Phil Muncaster • 16 Jan 2026
Is it time for internet services to adopt identity verification?
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
Tony Anscombe • 14 Jan 2026
Privacy
Your personal information is on the dark web. What happens next?
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
Phil Muncaster • 13 Jan 2026
Credential stuffing: What it is and how to protect yourself
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts
Christian Ali Bravo • 08 Jan 2026
Sign up for our newsletters