Latest Articles

OfferUp scammers are out in force: Here’s what you should know

OfferUp scammers are out in force: Here’s what you should know

OfferUp scammers are out in force: Here’s what you should know

The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.

Phil Muncaster04 Feb 2026


A slippery slope: Beware of Winter Olympics scams and other cyberthreats

A slippery slope: Beware of Winter Olympics scams and other cyberthreats

A slippery slope: Beware of Winter Olympics scams and other cyberthreats

It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.

Phil Muncaster02 Feb 2026


This month in security with Tony Anscombe – January 2026 edition

This month in security with Tony Anscombe – January 2026 edition

This month in security with Tony Anscombe – January 2026 edition

The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year

Editor30 Jan 2026


DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector

ESET Research30 Jan 2026


Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan

Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan

Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan

ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation

Lukas Stefanko28 Jan 2026


Drowning in spam or scam emails? Here’s probably why

Drowning in spam or scam emails? Here’s probably why

Drowning in spam or scam emails? Here’s probably why

Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.

Phil Muncaster27 Jan 2026


ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025

The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper

ESET Research23 Jan 2026


Children and chatbots: What parents should know

Children and chatbots: What parents should know

Children and chatbots: What parents should know

As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development

Phil Muncaster23 Jan 2026


Common Apple Pay scams, and how to stay safe

Common Apple Pay scams, and how to stay safe

Common Apple Pay scams, and how to stay safe

Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead

Phil Muncaster22 Jan 2026


Old habits die hard: 2025’s most common passwords were as predictable as ever

Old habits die hard: 2025’s most common passwords were as predictable as ever

Old habits die hard: 2025’s most common passwords were as predictable as ever

Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well

Christian Ali Bravo20 Jan 2026


Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.

Phil Muncaster16 Jan 2026


Is it time for internet services to adopt identity verification?

Is it time for internet services to adopt identity verification?

Is it time for internet services to adopt identity verification?

Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.

Tony Anscombe14 Jan 2026


Apt Activity Report
MDR Protection