Latest Articles

ESET Research

Arid Viper poisons Android apps with AridSpy

Arid Viper poisons Android apps with AridSpy

ESET Research

Arid Viper poisons Android apps with AridSpy

ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine

Lukas Stefanko13 Jun 2024


Digital Security

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

Digital Security

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The results of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Best Cybersecurity Vendor Blog is... drumroll, please... WeLiveSecurity!

Editor10 Jun 2024


Video

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe

Video

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe

Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data

Editor07 Jun 2024


Scams

The job hunter’s guide: Separating genuine offers from scams

The job hunter’s guide: Separating genuine offers from scams

Scams

The job hunter’s guide: Separating genuine offers from scams

$90,000/year, full home office, and 30 days of paid leave for a junior data analyst – what's not to like? Except that these kinds of job offers are only intended to trick unsuspecting victims into giving up their data.

Márk Szabó06 Jun 2024


How To

The murky world of password leaks – and how to check if you’ve been hit

The murky world of password leaks – and how to check if you’ve been hit

How To

The murky world of password leaks – and how to check if you’ve been hit

Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look

Márk Szabó03 Jun 2024


Video

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

Video

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability

Editor31 May 2024


We Live Progress

AI in HR: Is artificial intelligence changing how we hire employees forever?

AI in HR: Is artificial intelligence changing how we hire employees forever?

We Live Progress

AI in HR: Is artificial intelligence changing how we hire employees forever?

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?

Imogen Byers30 May 2024


Digital Security

ESET World 2024: Big on prevention, even bigger on AI

ESET World 2024: Big on prevention, even bigger on AI

Digital Security

ESET World 2024: Big on prevention, even bigger on AI

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.

Márk Szabó29 May 2024


Digital Security

Beyond the buzz: Understanding AI and its role in cybersecurity

Beyond the buzz: Understanding AI and its role in cybersecurity

Digital Security

Beyond the buzz: Understanding AI and its role in cybersecurity

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders

Phil Muncaster28 May 2024


Video

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

Video

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?

Editor24 May 2024


ESET Research

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

ESET Research

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings

Rene Holt23 May 2024


Digital Security

What happens when AI goes rogue (and how to stop it)

What happens when AI goes rogue (and how to stop it)

Digital Security

What happens when AI goes rogue (and how to stop it)

As AI gets closer to the ability to cause physical harm and impact the real world, “it’s complicated” is no longer a satisfying response

Cameron Camp22 May 2024


Apt Activity Report
MDR Protection