Award-winning news, views, and insight from the ESET security community
Lukas Stefanko • 22 Jul 2024 • 5 min. read
ESET Research
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
Romain Dumont • 18 Jul 2024 • 23 min. read
HotPage: Story of a signed, vulnerable, ad-injecting driver
Jiří Kropáč • 27 Jun 2024 • 2 min. read
ESET Research, Threat Reports
ESET Threat Report H1 2024
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Digital Security
October is Cybersecurity Awareness Month! Why being cyber-smart matters
The campaign may last for a month, but we should remember that cybersecurity is a year-round affair
Amer Owaida • 01 Oct 2021
Hackers could force locked iPhones to make contactless payments
Flaws in Apple Pay and Visa could allow criminals to make arbitrary contactless payments – no authentication needed, research finds
Amer Owaida • 30 Sep 2021
Threat Reports, ESET Research
ESET Threat Report T2 2021
A view of the T2 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Roman Kováč • 30 Sep 2021
CISA and NSA release guidance for securing VPNs
What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks
Amer Owaida • 29 Sep 2021
Google releases emergency fix to plug zero-day hole in Chrome
The emergency release comes a mere three days after Google’s previous update that plugged another 19 security loopholes
Amer Owaida • 27 Sep 2021
Video
Week in security with Tony Anscombe
ESET unmasks FamousSparrow APT group – Stopping cloud data leaks – European cybercrime ring busted
Editor • 24 Sep 2021
Bug in macOS Finder allows remote code execution
While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented
Amer Owaida • 23 Sep 2021
FamousSparrow: A suspicious hotel guest
Yet another APT group that exploited the ProxyLogon vulnerability in March 2021
Tahseen Bin Taj and Matthieu Faou • 23 Sep 2021
Plugging the holes: How to prevent corporate data leaks in the cloud
Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.
Phil Muncaster • 22 Sep 2021
Cybercrime
European police dismantle cybercrime ring with ties to Italian Mafia
The group used phishing, BEC and other types of attacks to swindle victims out of millions
Amer Owaida • 21 Sep 2021
Analysis of Numando banking trojan, steps to mitigate attack surface, and more! – Week in security with Tony Anscombe
Editor • 17 Sep 2021
Numando: Count once, code twice
The (probably) penultimate post in our occasional series demystifying Latin American banking trojans.
ESET Research • 17 Sep 2021
Sign up for our newsletters