Latest Articles

Digital Security

Safeguard the joy: 10 tips for securing your shiny new device

Safeguard the joy: 10 tips for securing your shiny new device

Digital Security

Safeguard the joy: 10 tips for securing your shiny new device

Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it aren’t secured properly

Phil Muncaster21 Dec 2023


Mobile Security

These aren’t the Androids you should be looking for

These aren’t the Androids you should be looking for

Mobile Security

These aren’t the Androids you should be looking for

You may get more than you bargained for when you buy a budget-friendly smartphone and forgo safeguards baked into Google Play

Roman Cuprik and Thomas Uhlemann20 Dec 2023


ESET Research, Threat Reports

ESET Threat Report H2 2023

ESET Threat Report H2 2023

ESET Research, Threat Reports

ESET Threat Report H2 2023

A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Jiří Kropáč19 Dec 2023


ESET Research

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET Research

ESET Research Podcast: Neanderthals, Mammoths and Telekopye

ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces

ESET Research18 Dec 2023


Video

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

Video

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes

Editor15 Dec 2023


ESET Research

OilRig’s persistent attacks using cloud service-powered downloaders

OilRig’s persistent attacks using cloud service-powered downloaders

ESET Research

OilRig’s persistent attacks using cloud service-powered downloaders

ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications

Zuzana Hromcová and Adam Burgher14 Dec 2023


Business Security, Digital Security

Delivering trust with DNS security

Delivering trust with DNS security

Business Security, Digital Security

Delivering trust with DNS security

Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?

Alžbeta Kovaľová13 Dec 2023


ESET Research

A pernicious potpourri of Python packages in PyPI

A pernicious potpourri of Python packages in PyPI

ESET Research

A pernicious potpourri of Python packages in PyPI

The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository

Marc-Etienne M.Léveillé and Rene Holt12 Dec 2023


We Live Progress

Black Hat Europe 2023: Should we regulate AI?

Black Hat Europe 2023: Should we regulate AI?

We Live Progress

Black Hat Europe 2023: Should we regulate AI?

ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past?

Tony Anscombe11 Dec 2023


Mobile Security

Silent but deadly: The rise of zero-click attacks

Silent but deadly: The rise of zero-click attacks

Mobile Security

Silent but deadly: The rise of zero-click attacks

A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable.

Márk Szabó11 Dec 2023


Video

Surge in deceptive loan apps – Week in security with Tony Anscombe

Surge in deceptive loan apps – Week in security with Tony Anscombe

Video

Surge in deceptive loan apps – Week in security with Tony Anscombe

ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi.

Editor08 Dec 2023


Critical Infrastructure

Black Hat Europe 2023: The past could return to haunt you

Black Hat Europe 2023: The past could return to haunt you

Critical Infrastructure

Black Hat Europe 2023: The past could return to haunt you

Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks.

Tony Anscombe08 Dec 2023


Apt Activity Report
MDR Protection