Award-winning news, views, and insight from the ESET security community
Crypto is soaring, but so are threats: Here’s how to keep your wallet safe
Business Security
APT groups are increasingly deploying ransomware – and that’s bad news for everyone
Digital Security
AI moves to your PC with its own special hardware
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Ukraine Crisis – Digital Security Resource Center
Fake news – why do people believe it?
In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real
André Lameiras • 18 May 2022
Video
How to spot and avoid a phishing attack – Week in security with Tony Anscombe
Can you spot the tell-tale signs of a phishing attempt and check if an email that has landed in your inbox is legit?
Editor • 13 May 2022
Scams
10 reasons why we fall for scams
The ‘it won’t happen to me’ mindset leaves you unprepared – here are some common factors that put any of us at risk of online fraud
André Lameiras • 12 May 2022
We Live Progress, Business Security
Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap
What can organizations do to capitalize on the current fluidity in the job market in order to bring fresh cybersecurity talent into the fold?
Phil Muncaster • 11 May 2022
Common LinkedIn scams: Beware of phishing attacks and fake job offers
LinkedIn scammers attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling victim to fraud when using the platform
André Lameiras • 09 May 2022
Defending against APT attacks – Week in security with Tony Anscombe
The conflict in Ukraine has highlighted the risks of cyberespionage attacks that typically involve Advanced Persistent Threat groups and often target organizations' most valuable data
Editor • 06 May 2022
There’s no sugarcoating it: That online sugar daddy may be a scammer
The bitter truth about how fraudsters dupe online daters in this new twist on romance fraud
Phil Muncaster • 05 May 2022
Mobile Security
3 most dangerous types of Android malware
Here's what you should know about some of the nastiest mobile malware around – from malicious software that takes phones and data hostage to RATs that allow hackers to control devices remotely
Lukas Stefanko • 04 May 2022
What’s behind the record-high number of zero days?
Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity
Phil Muncaster • 03 May 2022
TA410 under the microscope – Week in security with Tony Anscombe
Here's what you should know about FlowingFrog, LookingFrog and JollyFrog, the three teams making up the TA410 espionage umbrella group
Editor • 29 Apr 2022
ESET Research
A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity
ESET researchers reveal a detailed profile of TA410: we believe this cyberespionage umbrella group consists of three different teams using different toolsets, including a new version of the FlowCloud espionage backdoor discovered by ESET.
Alexandre Côté Cyr and Matthieu Faou • 27 Apr 2022
BEC: What to know about – and how to stop – the costliest internet scam
BEC fraud generated more losses for victims than any other type of cybercrime in 2021. It’s long past time that organizations got a handle on these scams.
Phil Muncaster • 26 Apr 2022
Sign up for our newsletters