Latest Articles

Digital Security

Got a new device? 7 things to do before disposing of your old tech

Got a new device? 7 things to do before disposing of your old tech

Digital Security

Got a new device? 7 things to do before disposing of your old tech

Before getting rid of your no-longer-needed device, make sure it doesn’t contain any of your personal documents or information

Phil Muncaster27 Dec 2023


Video

Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe

Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe

Video

Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe

How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET's latest Threat Report

Editor22 Dec 2023


Digital Security

Safeguard the joy: 10 tips for securing your shiny new device

Safeguard the joy: 10 tips for securing your shiny new device

Digital Security

Safeguard the joy: 10 tips for securing your shiny new device

Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly

Phil Muncaster21 Dec 2023


Mobile Security

These aren’t the Androids you should be looking for

These aren’t the Androids you should be looking for

Mobile Security

These aren’t the Androids you should be looking for

You may get more than you bargained for when you buy a budget-friendly smartphone and forgo safeguards baked into Google Play

Roman Cuprik and Thomas Uhlemann20 Dec 2023


ESET Research, Threat Reports

ESET Threat Report H2 2023

ESET Threat Report H2 2023

ESET Research, Threat Reports

ESET Threat Report H2 2023

A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč19 Dec 2023


ESET Research

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Research

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces

ESET Research18 Dec 2023


Video

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

Video

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes

Editor15 Dec 2023


ESET Research

OilRig’s persistent attacks using cloud service-powered downloaders

OilRig’s persistent attacks using cloud service-powered downloaders

ESET Research

OilRig’s persistent attacks using cloud service-powered downloaders

ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications

Zuzana Hromcová and Adam Burgher14 Dec 2023


Business Security, Digital Security

Delivering trust with DNS security

Delivering trust with DNS security

Business Security, Digital Security

Delivering trust with DNS security

Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?

Alžbeta Kovaľová13 Dec 2023


ESET Research

A pernicious potpourri of Python packages in PyPI

A pernicious potpourri of Python packages in PyPI

ESET Research

A pernicious potpourri of Python packages in PyPI

The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository

Marc-Etienne M.Léveillé and Rene Holt12 Dec 2023


We Live Progress

Black Hat Europe 2023: Should we regulate AI?

Black Hat Europe 2023: Should we regulate AI?

We Live Progress

Black Hat Europe 2023: Should we regulate AI?

ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past?

Tony Anscombe11 Dec 2023


Mobile Security

Silent but deadly: The rise of zero-click attacks

Silent but deadly: The rise of zero-click attacks

Mobile Security

Silent but deadly: The rise of zero-click attacks

A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.

Márk Szabó11 Dec 2023


Apt Activity Report
MDR Protection