top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Recovery scammers hit you when you’re down: Here’s how to avoid a ‘second strike’
If you’ve been the victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse. The worst thing you can do after falling victim to fraud is let your guard down. Online scammers only care about one thing: making money, so when new opportunities arise to do just that, they take them. It doesn’t matter if it involves re-victimizing someone who has already been defrauded, raising false hopes and exploiting th
ESET Expert
3 hours ago


Sednit reloaded: Back in the trenches
The resurgence of one of Russia’s most notorious APT groups Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different cloud provider for resilience. This dual‑implant approach enabled long‑term surveillance of Ukrainian military personnel. Interestingly, these current toolsets show a direct code lineage to the group’s 2010‑era implants. Key points of this blo
ESET Expert
3 days ago


Virtual machines, virtually everywhere – and with real security gaps
Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to fend for themselves. Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public beta testing before rolling out officially in 2008. These events sparked the era of modern on-demand cloud storage and computing that changed h
ESET Expert
Mar 31


This shopping season will be different. Prepare for AI-powered scams targeting Android
Cybercriminals can utilize new AI-powered threats for Android before Christmas. Learn how to avoid them. A few weeks before Christmas, it’s not only shopaholics who will go crazy. Cybercriminals too are ready to unleash all their worst tools to scam people who shop online, those expecting deliveries, and even those who want to donate to charity. This has all become a common problem, and many Android users have learned to live with it. However, this season we can expect an unp
ESET Expert
Mar 31


Android Threats in the Era of AI: Harder to spot for both humans and machines.
ESET Research reveals how cybercriminals have improved their malicious campaigns. In the current AI era, cyber-threats are evolving so quickly that even blog posts only a few weeks old can become outdated in the blink of an eye. During Black Friday 2025, we wrote about new threats targeting Android users ahead of the shopping season and, oh boy, it looks like it’s time to update the list. Since then, ESET researchers have identified new AI‑powered threats as well as updates
ESET Expert
Mar 31


What Cybersecurity actually does for your business.
The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed. Cybersecurity is one of the few business functions where success is typically quiet. From the outside, it may even look uneventful. On the inside, however, it reflects a sequence of seemingly unremarkable processes and controls doing what they were designed to do: stopping technical incidents from escalating into business
ESET Expert
Mar 24


ESET Endpoint Security for Windows v12 Achieves Common Criteria Certification
Common Criteria (ISO/IEC 15408) is the internationally recognized global standard for IT security evaluation and a key requirement for organizations operating in government, critical infrastructure, healthcare, finance, and other highly regulated sectors. By certifying our flagship endpoint product, ESET strengthens its position in competitive tenders worldwide and ensures alignment with evolving international certification frameworks. This certification highlights ESET’s com
ESET Expert
Mar 23


ESET launches Cloud Workload Protection and AI enhancements for ESET PROTECT customers
ESET to protect cloud virtual machines (VMs) from advanced threats with its new ESET Cloud Workload Protection module. While competitors often offer cloud workload protection as a stand-alone offering, ESET includes it at no additional cost for ESET PROTECT customers. Other updates include advanced AI reporting for ESET’s cloud sandboxing technology with autonomous remediation, improved investigations, and expanded integration for AI Advisor into the ESET PROTECT console. SAN
ESET Expert
Mar 23


Protecting education: How MDR can tip the balance in favor of schools
The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative? For the education sector, cybersecurity isn’t just about preserving reputation and minimizing financial damage. It plays a critical role in protecting student wellbeing and ensuring every child and young adult fulfils their learning potential. The challenge that schools, colleges and u
ESET Expert
Mar 11


Protecting education: How MDR can tip the balance in favor of schools
The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative? For the education sector, cybersecurity isn’t just about preserving reputation and minimizing financial damage. It plays a critical role in protecting student wellbeing and ensuring every child and young adult fulfils their learning potential. The challenge that schools, colleges and u
ESET Expert
Mar 11
Tags
Newsletter
Shop our products
bottom of page











