Award-winning news, views, and insight from the ESET security community
Roman Kováč • 05 Oct 2022 • 3 min. read
Threat Reports, ESET Research
ESET Threat Report T2 2022
A view of the T2 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Roman Kováč • 05 Oct 2022
ESET Research, Business Security
RDP on the radar: An up-close view of evolving remote access threats
Misconfigured remote access services continue to give bad actors an easy access path to company networks – here’s how you can minimize your exposure to attacks misusing Remote Desktop Protocol
Aryeh Goretsky • 07 Sep 2022
We Live Progress, Business Security
Collaboration and knowledge sharing key to progress in cybersecurity
In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers
Juan Manuel Harán • 13 Jul 2022
Business Security
Cyberattacks: A very real existential threat to organizations
One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?
Phil Muncaster • 04 Jul 2022
COVID-19, Business Security
Do back offices mean backdoors?
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture
James Shepperd • 29 Jun 2022
Ukraine Crisis – Digital Security Resource Center
Virtual private networks: 5 common questions about VPNs answered
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask
André Lameiras • 23 Jun 2022
Phishing awareness training: Help your employees avoid the hook
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
Phil Muncaster • 21 Jun 2022
Industroyer: A cyber-weapon that brought down a power grid
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids
André Lameiras • 13 Jun 2022
Cybersecurity awareness training: What is it and what works best?
Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk
Phil Muncaster • 07 Jun 2022