Latest Articles

ESET Research

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia

Romain Dumont02 Oct 2024


Business Security

Why system resilience should mainly be the job of the OS, not just third-party applications

Why system resilience should mainly be the job of the OS, not just third-party applications

Business Security

Why system resilience should mainly be the job of the OS, not just third-party applications

Building efficient recovery options will drive ecosystem resilience

Tony Anscombe01 Oct 2024


Digital Security

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Digital Security

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices

Tony Anscombe01 Oct 2024


Video

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

Video

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years

Editor27 Sep 2024


ESET Research

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine

Zoltán Rusnák26 Sep 2024


Digital Security

Don’t panic and other tips for staying safe from scareware

Don’t panic and other tips for staying safe from scareware

Digital Security

Don’t panic and other tips for staying safe from scareware

Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics

Phil Muncaster25 Sep 2024


Kids Online

Time to engage: How parents can help keep their children safe on Snapchat

Time to engage: How parents can help keep their children safe on Snapchat

Kids Online

Time to engage: How parents can help keep their children safe on Snapchat

Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app

Phil Muncaster24 Sep 2024


Video

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe

Video

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process

Editor20 Sep 2024


Video

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

Video

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.

Editor19 Sep 2024


Business Security

Understanding cyber-incident disclosure

Understanding cyber-incident disclosure

Business Security

Understanding cyber-incident disclosure

Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help

Tony Anscombe18 Sep 2024


ESET Research

ESET Research Podcast: EvilVideo

ESET Research Podcast: EvilVideo

ESET Research

ESET Research Podcast: EvilVideo

ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos

ESET Research17 Sep 2024


Digital Security

AI security bubble already springing leaks

AI security bubble already springing leaks

Digital Security

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one

Cameron Camp16 Sep 2024


Apt Activity Report
MDR Protection