Award-winning news, views, and insight from the ESET security community
ESET Research
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
We Live Science
Kathryn Thornton: Correcting Hubble's vision | Starmus Highlights
Digital Security
My information was stolen. Now what?
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Video
Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe
Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023
Editor • 15 Mar 2024
Threat intelligence explained | Unlocked 403 cybersecurity podcast (ep. 2)
We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats
Editor • 14 Mar 2024
How To
How to share sensitive files securely online
Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe
Phil Muncaster • 13 Mar 2024
Critical Infrastructure
Election cybersecurity: Protecting the ballot box and building trust in election integrity
What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?
Phil Muncaster • 12 Mar 2024
APT attacks taking aim at Tibetans – Week in security with Tony Anscombe
Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor
Editor • 08 Mar 2024
Evasive Panda leverages Monlam Festival to target Tibetans
ESET researchers uncover strategic web compromise and supply-chain attacks targeting Tibetans
Anh Ho, Facundo Muñoz, Marc-Etienne M.Léveillé • 07 Mar 2024
Scams
Top 10 scams targeting seniors – and how to keep your money safe
The internet can be a wonderful place. But it’s also awash with fraudsters preying on people who are susceptible to fraud.
Phil Muncaster • 06 Mar 2024
We Live Progress
Irresistible: Hooks, habits and why you can’t put down your phone
Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices.
Imogen Byers • 05 Mar 2024
Deceptive AI content and 2024 elections – Week in security with Tony Anscombe
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year
Editor • 01 Mar 2024
Business Security, Secure Coding
Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses
Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor
David González Cuautle • 29 Feb 2024
Vulnerabilities in business VPNs under the spotlight
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk
Márk Szabó • 28 Feb 2024
Social Media
10 things to avoid posting on social media – and why
Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.
Phil Muncaster • 26 Feb 2024
Sign up for our newsletters