Award-winning news, views, and insight from the ESET security community
Crypto is soaring, but so are threats: Here’s how to keep your wallet safe
Business Security
APT groups are increasingly deploying ransomware – and that’s bad news for everyone
Digital Security
AI moves to your PC with its own special hardware
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
How To
Webcam hacking: How to know if someone may be spying on you through your webcam
Camfecting doesn’t ‘just’ invade your privacy – it could seriously impact your mental health and wellbeing. Here’s how to keep an eye on your laptop camera.
Phil Muncaster • 25 Apr 2022
Video
Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe
As the Five Eyes nations warn of attacks against critical infrastructure, we look at the potentially cascading effects of such attacks and how essential systems and services can ramp up their defense
Editor • 22 Apr 2022
Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center
Critical infrastructure: Under cyberattack for longer than you might think
Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services
André Lameiras • 21 Apr 2022
Is your Lenovo laptop vulnerable to cyberattack?
Here’s what to know about vulnerabilities in more than 100 Lenovo consumer laptop models and what you can do right away to stay safe – all in under three minutes
Tony Anscombe • 20 Apr 2022
ESET Research
When "secure" isn't secure at all: High-impact UEFI vulnerabilities discovered in Lenovo consumer laptops
ESET researchers discover multiple vulnerabilities in various Lenovo laptop models that allow an attacker with admin privileges to expose the user to firmware-level malware
Martin Smolár • 19 Apr 2022
Week in security with Tony Anscombe
Ukrainian energy provider targeted by Industroyer2 – ESET helps disrupt Zloader botnets – Where do new ideas come from and how are they spread?
Editor • 14 Apr 2022
ESET takes part in global operation to disrupt Zloader botnets
ESET researchers provided technical analysis, statistical information, and known command and control server domain names and IP addresses
Jean-Ian Boutin and Tomáš Procházka • 13 Apr 2022
ESET Research, Critical Infrastructure, Ukraine Crisis – Digital Security Resource Center
Industroyer2: Industroyer reloaded
This ICS-capable malware targets a Ukrainian energy company
ESET Research • 12 Apr 2022
Fake e-shops & Android malware – A journey into the dark recesses of the world wide web – Keeping your cloud resources safe
Editor • 08 Apr 2022
How secure is your cloud storage? Mitigating data security risks in the cloud
As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice
Phil Muncaster • 07 Apr 2022
Fake e-shops on the prowl for banking credentials using Android malware
ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks
Lukas Stefanko • 06 Apr 2022
Cybercrime
We’re going on Tor
If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the browser.
Jake Moore • 05 Apr 2022
Sign up for our newsletters