top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Your passwords and credit cards are their loot: How infostealers work
At ESET’s annual technology conference ETeC 2025, malware researcher Jakub Kaloč explained how cybercriminals run infostealers as a service via a real-life demonstration. An admin comes to work, opens a dashboard and checks for tasks, notifications, and revenue statistics. You’re thinking of a software as a service company (SaaS), right? Not quite. This scene shows how modern cybercrime focused on data theft looks. And you are its target. Infostealers are on the rise, threate
ESET Expert
2 hours ago


How to protect valuable aviation and aerospace IP and R&D
You can’t soar when your secrets are leaking below. When the United States initiated the Advanced Technology Bomber program, better known as the B-2 Spirit, in the 1970s, the fast track to a cutting-edge stealth bomber tracked to the fact that the Northrop Corporation already had experience with mature flying-wing designs, which enabled the necessary low radar signature, as far back as 1942 1 . Those prototypes, the Northrop XB-35 and YB-35B , were clearly reflected in the co
ESET Expert
1 day ago


Fraud prevention: How to help older family members avoid scams
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically When we talk about fraud that can inflict a severe financial and emotional toll on the victims, it’s not hyperbole. One area where this is increasingly evident is elder fraud, as the amounts of money lost to various kinds of online scams climb sharply every year. In 2024 alone, Americans aged 60+ reported almost $4.9 billion in losses to online scams, an i
ESET Expert
2 days ago


IT service desks: The security blind spot that may put your business at risk
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap. Supply chain risk is surging among global businesses. Verizon claims that third-party involvement in data breaches doubled over the past year to 30%. Yet usually this kind of risk is framed in terms of problems with open source components ( Log4Shell ), proprietary software (MOVEit) and bricks and mortar suppliers ( Synnovis ). Wh
ESET Expert
6 days ago


How MDR can give MSPs the edge in a competitive market
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs Managed service providers (MSPs) should be in a good place right now. As businesses continue to grow their digital operations, they increasingly need expert partners to help deploy and manage critical IT products and services. Nowhere is this need more pronounced than in cybersecurity. According to Canalys , revenue from managed se
ESET Expert
7 days ago


Recruitment red flags: Can you spot a spy posing as a job seeker?
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms Back in July 2024, cybersecurity vendor KnowBe4 began to observe suspicious activity linked to a new hire. The individual began manipulating and transferring potentially harmful files, and tried to execute unauthorized software. He was subsequently found out to be a North Korean worker who had tricked the firm’s HR team into gaining remote employment with t
ESET Expert
Oct 28


ESET Research analyzes a recent cyberespionage campaign linked toOperation DreamJob by North Korean Lazarus group
ESET researchers have recently observed a new instance of Operation DreamJob – a campaign that we track under the umbrella of North Korea-aligned Lazarus – in which several European companies active in the defense industry were targeted. Some of these are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea’s current efforts to scale up its drone program. This blogpost discusses the broader geopolitical impli
ESET Expert
Oct 24
Tags
Newsletter
Follow us
Shop our products
bottom of page









