Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 22 Jul 2024 • 5 min. read
ESET Research
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
Romain Dumont • 18 Jul 2024 • 23 min. read
HotPage: Story of a signed, vulnerable, ad-injecting driver
Jiří Kropáč • 27 Jun 2024 • 2 min. read
ESET Research, Threat Reports
ESET Threat Report H1 2024
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
6 steps to getting the board on board with your cybersecurity program
How CISOs and their peers can better engage with boards to get long-term buy-in for strategic initiatives
Phil Muncaster • 11 Oct 2023
Digital Security
Virus Bulletin PUA – a love letter
Late nights at VB2023 featured intriguing interactions between security experts and the somewhat enigmatic world of grayware purveyors
Cameron Camp • 10 Oct 2023
Your family, home and small business need a cyber-resilience strategy, too!
Your preparedness to deal with cyberattacks is key for lessening the impact of a successful incident – even in home and small business environments
Tony Anscombe • 09 Oct 2023
Video
DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe
The backdoor can exfiltrate files, manipulate Windows registry keys, and execute commands that are capable of performing various actions on a victim’s machine
Editor • 06 Oct 2023
Social Media
Fake friends and followers on social media – and how to spot them
One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who they claim to be. Here’s how to recognize them.
Phil Muncaster • 06 Oct 2023
Operation Jacana: Foundling hobbits in Guyana
ESET researchers discovered a cyberespionage campaign against a governmental entity in Guyana
Fernando Tavella • 05 Oct 2023
We Live Progress, Digital Security
Playing your part in building a safer digital world: Why cybersecurity matters
In an increasingly complex and interconnected digital landscape, personal cybersecurity empowers you to protect your data, privacy and digital well-being
Phil Muncaster • 03 Oct 2023
How Lazarus impersonated Meta to attack a target in Spain – Week in security with Tony Anscombe
During the attack, the group deployed several tools, most notably a newly-discovered sophisticated backdoor that ESET named LightlessCan
Editor • 29 Sep 2023
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company
While analyzing a Lazarus attack luring employees of an aerospace company, ESET researchers discovered a publicly undocumented backdoor
Peter Kálnai • 29 Sep 2023
Secure Coding
5 of the top programming languages for cybersecurity
While far from all roles in security explicitly demand coding skills, it’s challenging to envision a career in this field that wouldn’t derive substantial advantages from at least a basic understanding of fundamental coding principles
Christian Ali Bravo • 27 Sep 2023
Secure Coding, Business Security
Can open-source software be secure?
Or, is mass public meddling just opening the door for problems? And how does open-source software compare to proprietary software in terms of security?
Aryeh Goretsky and Cameron Camp • 26 Sep 2023
ESET's cutting-edge threat research at LABScon – Week in security with Tony Anscombe
Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups
Editor • 22 Sep 2023
Sign up for our newsletters