Award-winning news, views, and insight from the ESET security community
ESET Research
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
We Live Science
Kathryn Thornton: Correcting Hubble's vision | Starmus Highlights
Digital Security
My information was stolen. Now what?
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Top 5 search engines for internet-connected devices and services
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
Camilo Gutiérrez Amaya • 18 May 2023
Meet “AI”, your new colleague: could it expose your company's secrets?
Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk
Roman Cuprik • 17 May 2023
You may not care where you download software from, but malware does
Why do people still download files from sketchy places and get compromised as a result?
Aryeh Goretsky • 16 May 2023
Video
Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
Editor • 12 May 2023
Kids Online
Why you need parental control software – and 5 features to look for
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
Phil Muncaster • 12 May 2023
Privacy
Turning on stealth mode: 5 simple strategies for staying under the radar online
Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details
André Lameiras • 10 May 2023
Threat Reports, ESET Research
ESET APT Activity Report Q4 2022–Q1 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023
Jean-Ian Boutin • 09 May 2023
Ukraine Crisis – Digital Security Resource Center, Business Security
How the war in Ukraine has been a catalyst in private-public collaborations
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
André Lameiras • 09 May 2023
APTs target MSP access to customer networks – Week in security with Tony Anscombe
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
Editor • 05 May 2023
Digital Security, Business Security
Creating strong, yet user-friendly passwords: Tips for your business password policy
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization
Roman Cuprik • 04 May 2023
Social Media
Using Discord? Don’t play down its privacy and security risks
It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut
Márk Szabó • 03 May 2023
APT groups muddying the waters for MSPs
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers
James Shepperd • 02 May 2023
Sign up for our newsletters