Award-winning news, views, and insight from the ESET security community
Jiří Kropáč • 27 Jun 2024 • 2 min. read
ESET Research, Threat Reports
ESET Threat Report H1 2024
Lukas Stefanko • 13 Jun 2024 • 19 min. read
ESET Research
Arid Viper poisons Android apps with AridSpy
Rene Holt • 23 May 2024 • 6 min. read
Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Video
Social media and teen mental health – Week in security with Tony Anscombe
Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick?
Editor • 04 Jul 2024
Scams
No room for error: Don’t get stung by these common Booking.com scams
From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation
Christian Ali Bravo • 03 Jul 2024
We Live Progress
AI in the workplace: The good, the bad, and the algorithmic
While AI can liberate us from tedious tasks and even eliminate human error, it's crucial to remember its weaknesses and the unique capabilities that humans bring to the table
Imogen Byers • 02 Jul 2024
Scams, Social Media
Hijacked: How hacked YouTube channels spread scams and malware
Here’s how cybercriminals go after YouTube channels and use them as conduits for fraud – and what you should watch out for when watching videos on the platform
Christian Ali Bravo • 01 Jul 2024
Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe
Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year
Editor • 28 Jun 2024
A view of the H1 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Jiří Kropáč • 27 Jun 2024
Cyber insurance as part of the cyber threat mitigation strategy
Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies
Tony Anscombe • 26 Jun 2024
Privacy
Buying a VPN? Here’s what to know and look for
VPNs are not all created equal – make sure to choose the right provider that will help keep your data safe from prying eyes
Phil Muncaster • 25 Jun 2024
The long-tail costs of a data breach – Week in security with Tony Anscombe
Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents
Editor • 21 Jun 2024
Digital Security
My health information has been stolen. Now what?
As health data continues to be a prized target for hackers, here's how to minimize the fallout from a breach impacting your own health records
Phil Muncaster • 20 Jun 2024
Business Security, Critical Infrastructure
Hacktivism is evolving – and that could be bad news for organizations everywhere
Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat
Phil Muncaster • 19 Jun 2024
Preventative defense tactics in the real world
Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack
Cameron Camp • 17 Jun 2024
Sign up for our newsletters