top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search

Phishing messages deceive Apple iMessage users into turning off protection
Cybercriminals are exploiting a trick to bypass Apple iMessage’s built-in phishing protection. According to Bleeping Computer * they send...
ESET Expert
Jan 13


Cybersecurity is never out-of-office: Protecting your business anytime, anywhere
While you’re enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company’s...
ESET Expert
Dec 23, 2024


Beware of fake AI tools masking very real malware threats
Ever attuned to the latest trends, cybercriminals distribute malicious tools that pose as ChatGPT, Midjourney and other generative AI...
ESET Expert
Jul 30, 2024


Preventative defense tactics in the real world
Don’t get hacked in the first place – it’s much less expensive than dealing with the aftermath of a successful attack. We watch real life...
ESET Expert
Jun 19, 2024


ESET Research: Arid Viper group targets Middle East, poisons Palestinian app with spyware
ESET researchers have identified five campaigns that employ trojanised apps to target Android users. ESET Research discovered multistage...
ESET Expert
Jun 13, 2024


Beyond the buzz: Understanding AI and its role in cybersecurity
A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders. Artificial intelligence...
ESET Expert
May 29, 2024


Untangling the hiring dilemma: How security solutions free up HR processes
The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to...
ESET Expert
May 21, 2024


Major phishing-as-a-service platform disrupted
The investigation uncovered at least 40,000 phishing domains that were linked to LabHost and tricked victims into handing over their...
ESET Expert
May 6, 2024


Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses
Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor. Do...
ESET Expert
Mar 4, 2024


Vulnerabilities in business VPNs under the spotlight
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about...
ESET Expert
Feb 29, 2024
Tags
Newsletter
Follow us
Shop our products
bottom of page