Award-winning news, views, and insight from the ESET security community
ESET Research • 02 Dec 2025 • 20 min. read
ESET Research
MuddyWater: Snakes by the riverbank
Facundo Muñoz and Dávid Gábriš • 19 Nov 2025 • 9 min. read
PlushDaemon compromises network devices for adversary-in-the-middle attacks
Peter Kálnai and Alexis Rapin • 23 Oct 2025 • 12 min. read
Gotta fly: Lazarus targets the UAV sector
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Black Hat Europe 2025: Was that device designed to be on the internet at all?
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
Tony Anscombe • 12 Dec 2025
Black Hat Europe 2025: Reputation matters – even in the ransomware economy
Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims
Tony Anscombe • 11 Dec 2025
Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
Steven Connolly • 11 Dec 2025
Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
Márk Szabó, James Shepperd, Ben Tudor • 10 Dec 2025
The big catch: How whaling attacks target top executives
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
Phil Muncaster • 09 Dec 2025
Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs.
Phil Muncaster • 04 Dec 2025
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook
ESET Research • 02 Dec 2025
Social Media
Oversharing is not caring: What’s at stake if your employees post too much online
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
Phil Muncaster • 01 Dec 2025
Video
This month in security with Tony Anscombe – November 2025 edition
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news
Editor • 28 Nov 2025
Kids Online
What parents should know to protect their children from doxxing
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.
Phil Muncaster • 27 Nov 2025
Influencers in the crosshairs: How cybercriminals are targeting content creators
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
Phil Muncaster • 25 Nov 2025
MDR is the answer – now, what’s the question?
Why your business needs the best-of-breed combination of technology and human expertise
Steven Connolly • 24 Nov 2025
Sign up for our newsletters