Latest Articles

ESET Research Podcast: Telekopye, again

ESET Research Podcast: Telekopye, again

ESET Research Podcast: Telekopye, again

Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of 'Neanderthals’ wield the Telekopye toolkit to ensnare unsuspecting victims they call 'Mammoths'

ESET Research20 Dec 2024


Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (special edition)

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (special edition)

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (special edition)

ESET's Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging online fraud

Editor19 Dec 2024


Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

While you're enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company's defenses are ready, no matter the time of year

Phil Muncaster18 Dec 2024


ESET Threat Report H2 2024: Key findings

ESET Threat Report H2 2024: Key findings

ESET Threat Report H2 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for staying secure in 2025

Editor16 Dec 2024


ESET Threat Report H2 2024

ESET Threat Report H2 2024

ESET Threat Report H2 2024

A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč16 Dec 2024


Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow

Tony Anscombe13 Dec 2024


Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems

Tony Anscombe13 Dec 2024


Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?

Tony Anscombe12 Dec 2024


How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats?

Editor10 Dec 2024


Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost

Phil Muncaster09 Dec 2024


Philip Torr: AI to the people | Starmus highlights

Philip Torr: AI to the people | Starmus highlights

Philip Torr: AI to the people | Starmus highlights

We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact

Tomáš Foltýn05 Dec 2024


Achieving cybersecurity compliance in 5 steps

Achieving cybersecurity compliance in 5 steps

Achieving cybersecurity compliance in 5 steps

Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements

Márk Szabó03 Dec 2024


Apt Activity Report
MDR Protection