top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026
NOTE: The views and opinions expressed in this blog post are those of ESET and do not necessarily reflect the views or positions of the MITRE Corporation. The hidden treasure in the latest MITRE ATT&CK® Enterprise Evaluation is in the summaries and data deep-dives, not in headlines from vendors with high sales intent, under pressure to “sell” Detection & Response. As a result, even astute readers may miss the forest for the trees, seeing only individual performances and yet-t
ESET Expert
Dec 11, 2025


Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs. What do M&S and Co-op Group have in common? Aside from being among the UK’s most recognizable high street retailers, they were both recently the victims of a major ransomware breach. They were also both targeted by vishing attacks that elicited corporate passwords , providing their extorters with a critical foothold in the network. These identity-related breaches cost the two retailers over £
ESET Expert
Dec 9, 2025


First known AI-powered ransomware uncovered by ESET Research
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats ESET researchers have discovered what they called "the first known AI-powered ransomware". The malware, which ESET has named PromptLock, has the ability to exfiltrate, encrypt and possibly even destroy data, though this last functionality appears not to have been implemented in the malware yet. While PromptLock was not spotted in actual attacks and is instead though
ESET Expert
Aug 28, 2025


The need for speed: Why organizations are turning to rapid, trustworthy MDR
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries. How long does it take for threat actors to move from initial access to lateral movement? Days? Hours? Unfortunately, the answer for many organizations is increasingly “minutes.” In fact, at 48 minutes, the average breakout time in 2024 was 22% shorter than the previous year, according to one report . Adding to the concerns is another figure f
ESET Expert
Aug 22, 2025


Not so sexy: How to combat deepfakes and sextortion
AI deepfakes used for sextortion highlight a growing problem with consumer privacy — but are we ready to forgo our online comforts for...
ESET Expert
Aug 18, 2025


When access becomes a risk: Cyber threats facing professional services
Professional services ensure success for their clients, but what about their own livelihoods? Their access is their bane, as threat...
ESET Expert
Aug 8, 2025


Why the tech industry needs to stand firm on preserving end-to-end encryption
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to...
ESET Expert
Aug 4, 2025


Debunking five myths about business encryption
Let’s set the record straight and see why encryption is the cornerstone of company security. For businesses, encryption is more than...
ESET Expert
Jul 16, 2025
Security: Businesses need more. ESET moves from Essential to Advanced
With the evolution of threats, the definition of essential security is changing, and advanced tools are needed. The evolution of...
ESET Expert
Jul 14, 2025


Is your server protection up to par?
Security for local servers remains a critical aspect of an organization’s overall cybersecurity strategy. Despite the popularity of...
ESET Expert
Jul 10, 2025
Tags
Newsletter
Follow us
Shop our products
bottom of page















