Award-winning news, views, and insight from the ESET security community
ESET Research
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
We Live Science
Kathryn Thornton: Correcting Hubble's vision | Starmus Highlights
Digital Security
My information was stolen. Now what?
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Safeguard the joy: 10 tips for securing your shiny new device
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly
Phil Muncaster • 21 Dec 2023
Mobile Security
These aren’t the Androids you should be looking for
You may get more than you bargained for when you buy a budget-friendly smartphone and forgo safeguards baked into Google Play
Roman Cuprik and Thomas Uhlemann • 20 Dec 2023
ESET Research, Threat Reports
ESET Threat Report H2 2023
A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Jiří Kropáč • 19 Dec 2023
ESET Research Podcast: Neanderthals, Mammoths and Telekopye
ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces
ESET Research • 18 Dec 2023
Video
New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe
Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes
Editor • 15 Dec 2023
OilRig’s persistent attacks using cloud service-powered downloaders
ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications
Zuzana Hromcová and Adam Burgher • 14 Dec 2023
Business Security, Digital Security
Delivering trust with DNS security
Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?
Alžbeta Kovaľová • 13 Dec 2023
A pernicious potpourri of Python packages in PyPI
The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository
Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023
We Live Progress
Black Hat Europe 2023: Should we regulate AI?
ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past?
Tony Anscombe • 11 Dec 2023
Silent but deadly: The rise of zero-click attacks
A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.
Márk Szabó • 11 Dec 2023
Surge in deceptive loan apps – Week in security with Tony Anscombe
ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi.
Editor • 08 Dec 2023
Critical Infrastructure
Black Hat Europe 2023: The past could return to haunt you
Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.
Tony Anscombe • 08 Dec 2023
Sign up for our newsletters