Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 22 Jul 2024 • 5 min. read
ESET Research
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
Romain Dumont • 18 Jul 2024 • 23 min. read
HotPage: Story of a signed, vulnerable, ad-injecting driver
Jiří Kropáč • 27 Jun 2024 • 2 min. read
ESET Research, Threat Reports
ESET Threat Report H1 2024
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Digital Security
Got a new device? 7 things to do before disposing of your old tech
Before getting rid of your no-longer-needed device, make sure it doesn’t contain any of your personal documents or information
Phil Muncaster • 27 Dec 2023
Video
Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe
How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET's latest Threat Report
Editor • 22 Dec 2023
Safeguard the joy: 10 tips for securing your shiny new device
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly
Phil Muncaster • 21 Dec 2023
Mobile Security
These aren’t the Androids you should be looking for
You may get more than you bargained for when you buy a budget-friendly smartphone and forgo safeguards baked into Google Play
Roman Cuprik and Thomas Uhlemann • 20 Dec 2023
ESET Threat Report H2 2023
A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Jiří Kropáč • 19 Dec 2023
ESET Research Podcast: Neanderthals, Mammoths and Telekopye
ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces
ESET Research • 18 Dec 2023
New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe
Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes
Editor • 15 Dec 2023
OilRig’s persistent attacks using cloud service-powered downloaders
ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications
Zuzana Hromcová and Adam Burgher • 14 Dec 2023
Business Security, Digital Security
Delivering trust with DNS security
Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?
Alžbeta Kovaľová • 13 Dec 2023
A pernicious potpourri of Python packages in PyPI
The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository
Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023
We Live Progress
Black Hat Europe 2023: Should we regulate AI?
ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past?
Tony Anscombe • 11 Dec 2023
Silent but deadly: The rise of zero-click attacks
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.
Márk Szabó • 11 Dec 2023
Sign up for our newsletters