top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Cybersecurity for renewable energy: Best practices to protect critical infrastructure
Developments around renewable energy are moving fast. How can the sector ensure that cybersecurity keeps up in face of destructive attacks? he world is going electric. Transportation, heating & cooling, and energy distribution are increasingly being supplied via fossil-fuel-free methods. Regulations are being introduced in parallel, with mandates in some regions seeking a reduction of emissions by as much as 55% by 2030 . Across the world, businesses of all sizes are driving
ESET Expert
3 days ago


Old habits die hard: 2025’s most common passwords were as predictable as ever
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well ‘123456’ continues to reign supreme as the most commonly-used password among people across the world, according to two reports, from NordPass and Comparitech , respectively. A full 25 percent of the top 1,000 most-used passwords are made up of nothing but numerals. In addition, ‘123456’ appealed to people of various age cohorts, as it was the most-favored optio
ESET Expert
5 days ago


Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are. In November, Britain’s Security Service began notifying members of parliament (MPs) and their staff of an audacious foreign intelligence-gathering scheme. It claimed two profiles on LinkedIn were approaching individuals working in British politics in order to solicit “insider insights”. The revelations from MI5 pre
ESET Expert
Jan 23


Muddying the inbox: The hidden dangers of internal spearphishing
The latest ESET research sheds light on an advanced phishing technique that SOCs might find hard to catch. We’ve written about spearphishing before, highlighting ESET Research’s telemetry finds concerning this insidious, highly personalized attack type. However, the story isn’t over. In their latest findings, researchers have gone on to detail a series of successful phishing attempts by the Iran-aligned MuddyWater APT group, using a very specific attack technique — internal
ESET Expert
Jan 20


Is it time for internet services to adopt identity verification?
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters. New legislation in Australia makes it illegal for those under 16 to have a social media account. To avoid financial penalties, social media companies have scrambled to remove accounts they believe breach the legislation. Notably, there are no consequences for the under-16s who attempt to create an account using a fraudulent age. As the first countr
ESET Expert
Jan 16


Your personal information is on the dark web. What happens next?
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do. Contrary to popular belief, much of the dark web isn’t the den of digital iniquity that some commentators claim. In fact, there are plenty of legitimate sites and forums there offering privacy-enhanced content and services to help individuals avoid censorship and oppression. However, the truth is, it’s also a magnet for cybercriminals, who
ESET Expert
Jan 14


Credential stuffing: What it is and how to protect yourself
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Reusing the same password across multiple accounts may be convenient, but it sets you up for trouble that can cascade across your digital life. This (bad) habit creates the perfect opening for credential stuffing, a technique where bad actors take a list of previously exposed login credentials and systematically feed the username and password pairs into the login fi
ESET Expert
Jan 9


A brush with online fraud: What are brushing scams and how do I stay safe?
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow. Global e-commerce sales are predicted to exceed $6.4 trillion in 2025. And a large share of these will come via marketplaces. But while they ostensibly offer convenience and safety for consumers and expanded reach for businesses, there is a darker side to the industry. In 2024, Amazon alone proactively blocked over 275 million suspec
ESET Expert
Dec 31, 2025


Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of the most widely used image formats. The flaw, found and documented by Zscaler ThreatLabz, piqued our interest, as Microsoft assessed its severity as critical but deemed its exploitability as
ESET Expert
Dec 29, 2025
Tags
Newsletter
Follow us
Shop our products
bottom of page









