Latest Articles

Video

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

Video

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.

Editor19 Sep 2024


Business Security

Understanding cyber-incident disclosure

Understanding cyber-incident disclosure

Business Security

Understanding cyber-incident disclosure

Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help

Tony Anscombe18 Sep 2024


ESET Research

ESET Research Podcast: EvilVideo

ESET Research Podcast: EvilVideo

ESET Research

ESET Research Podcast: EvilVideo

ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos

ESET Research17 Sep 2024


Digital Security

AI security bubble already springing leaks

AI security bubble already springing leaks

Digital Security

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one

Cameron Camp16 Sep 2024


Video, Ransomware

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

Video, Ransomware

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends

Editor13 Sep 2024


Scams

6 common Geek Squad scams and how to defend against them

6 common Geek Squad scams and how to defend against them

Scams

6 common Geek Squad scams and how to defend against them

Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks

Phil Muncaster11 Sep 2024


ESET Research

CosmicBeetle steps up: Probation period at RansomHub

CosmicBeetle steps up: Probation period at RansomHub

ESET Research

CosmicBeetle steps up: Probation period at RansomHub

CosmicBeetle, after improving its own ransomware, tries its luck as a RansomHub affiliate

Jakub Souček10 Sep 2024


Video

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

Video

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams

Editor06 Sep 2024


ESET Research

ESET Research Podcast: HotPage

ESET Research Podcast: HotPage

ESET Research

ESET Research Podcast: HotPage

ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver

ESET Research05 Sep 2024


Business Security

The key considerations for cyber insurance: A pragmatic approach

The key considerations for cyber insurance: A pragmatic approach

Business Security

The key considerations for cyber insurance: A pragmatic approach

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the questions organizations should consider when reviewing their cyber insurance options

Tony Anscombe04 Sep 2024


Malware

In plain sight: Malicious ads hiding in search results

In plain sight: Malicious ads hiding in search results

Malware

In plain sight: Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad

Márk Szabó03 Sep 2024


Video

Stealing cash using NFC relay – Week in Security with Tony Anscombe

Stealing cash using NFC relay – Week in Security with Tony Anscombe

Video

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become

Editor28 Aug 2024


Apt Activity Report
MDR Protection