top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Drowning in spam or scam emails? Here’s probably why
Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide. For all our modern obsession with social media and messaging apps, email remains a daily staple for many of us. Modern email providers are pretty good at filtering out unsolicited messages known as spam, their checks don’t necessarily work all the time. Much like with unwanted phone calls , sometimes it can feel like the internet go
ESET Expert
Feb 6


Children and chatbots: What parents should know
As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development AI chatbots have become a big part of all of our lives since they burst onto the scene more than three years ago. ChatGPT, for example, says it has around 700 million weekly active users, many of whom are “young people.” A UK study from July 2025 found that nearly two-thirds (64%) of children use such tools. A similar share of paren
ESET Expert
Feb 2


Cybersecurity for renewable energy: Best practices to protect critical infrastructure
Developments around renewable energy are moving fast. How can the sector ensure that cybersecurity keeps up in face of destructive attacks? he world is going electric. Transportation, heating & cooling, and energy distribution are increasingly being supplied via fossil-fuel-free methods. Regulations are being introduced in parallel, with mandates in some regions seeking a reduction of emissions by as much as 55% by 2030 . Across the world, businesses of all sizes are driving
ESET Expert
Jan 29


Old habits die hard: 2025’s most common passwords were as predictable as ever
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well ‘123456’ continues to reign supreme as the most commonly-used password among people across the world, according to two reports, from NordPass and Comparitech , respectively. A full 25 percent of the top 1,000 most-used passwords are made up of nothing but numerals. In addition, ‘123456’ appealed to people of various age cohorts, as it was the most-favored optio
ESET Expert
Jan 27


Why LinkedIn is a hunting ground for threat actors – and how to protect yourself
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are. In November, Britain’s Security Service began notifying members of parliament (MPs) and their staff of an audacious foreign intelligence-gathering scheme. It claimed two profiles on LinkedIn were approaching individuals working in British politics in order to solicit “insider insights”. The revelations from MI5 pre
ESET Expert
Jan 23


Muddying the inbox: The hidden dangers of internal spearphishing
The latest ESET research sheds light on an advanced phishing technique that SOCs might find hard to catch. We’ve written about spearphishing before, highlighting ESET Research’s telemetry finds concerning this insidious, highly personalized attack type. However, the story isn’t over. In their latest findings, researchers have gone on to detail a series of successful phishing attempts by the Iran-aligned MuddyWater APT group, using a very specific attack technique — internal
ESET Expert
Jan 20


A brush with online fraud: What are brushing scams and how do I stay safe?
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow. Global e-commerce sales are predicted to exceed $6.4 trillion in 2025. And a large share of these will come via marketplaces. But while they ostensibly offer convenience and safety for consumers and expanded reach for businesses, there is a darker side to the industry. In 2024, Amazon alone proactively blocked over 275 million suspec
ESET Expert
Dec 31, 2025


Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of the most widely used image formats. The flaw, found and documented by Zscaler ThreatLabz, piqued our interest, as Microsoft assessed its severity as critical but deemed its exploitability as
ESET Expert
Dec 29, 2025


Turbulence ahead: Cyber threats in aviation
Aviation and aerospace can’t fly under cyber threat actors’ radars anymore. Man has always been keen on pushing past preconceived limits. The Wright brothers made the skies the limit … until Neil Armstrong took a giant leap for mankind by stepping onto the surface of the moon. None of these advances would have been possible without the ingenuity of tinkerers, scientists, and engineers, or the fearlessness of test pilots. In recent years, software developers have become a new
ESET Expert
Dec 23, 2025


Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity
If you don’t look inside your environment, you can’t know its true state – and attackers count on that I recently had, what I thought, was a unique brainwave. (Spoiler alert: it wasn’t, but please read on!) As a marketing leader at ESET UK, part of my role is to communicate how our powerful and comprehensive solutions can be implemented to protect organisations, in a way that helps clarify the case for upgrading to higher levels of cybersecurity. And that need for clarity is
ESET Expert
Dec 15, 2025
Tags
Newsletter
Follow us
Shop our products
bottom of page















