top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


How to secure aviation’s connected systems
In aviation, getting more connected might take on a dangerous dimension. There are three aspects to the aviation sector that assign it great value — IP and R&D ; the human factor (e.g., talent, capacity); and finally, the connected IT systems (and their data) used to harness and scale the potency of moving people and things farther and faster. The interdependence between aircraft, airports and global supply chains comprise multiple complex connected systems. These include eve
ESET Expert
Nov 13, 2025


Ground zero: 5 things to do after discovering a cyberattack
When every minute counts, preparation and precision can mean the difference between disruption and disaster Network defenders are feeling the heat. The number of data breaches Verizon investigated last year, as a share of overall incidents, was up 20 percentage points on the previous year. This need not be as catastrophic as it sounds, as long as teams are able to respond rapidly and decisively to intrusions. But those first minutes and hours are critical. Preparation is the
ESET Expert
Nov 10, 2025


Your passwords and credit cards are their loot: How infostealers work
At ESET’s annual technology conference ETeC 2025, malware researcher Jakub Kaloč explained how cybercriminals run infostealers as a service via a real-life demonstration. An admin comes to work, opens a dashboard and checks for tasks, notifications, and revenue statistics. You’re thinking of a software as a service company (SaaS), right? Not quite. This scene shows how modern cybercrime focused on data theft looks. And you are its target. Infostealers are on the rise, threate
ESET Expert
Nov 5, 2025


How to protect valuable aviation and aerospace IP and R&D
You can’t soar when your secrets are leaking below. When the United States initiated the Advanced Technology Bomber program, better known as the B-2 Spirit, in the 1970s, the fast track to a cutting-edge stealth bomber tracked to the fact that the Northrop Corporation already had experience with mature flying-wing designs, which enabled the necessary low radar signature, as far back as 1942 1 . Those prototypes, the Northrop XB-35 and YB-35B , were clearly reflected in the co
ESET Expert
Nov 4, 2025


Fraud prevention: How to help older family members avoid scams
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically When we talk about fraud that can inflict a severe financial and emotional toll on the victims, it’s not hyperbole. One area where this is increasingly evident is elder fraud, as the amounts of money lost to various kinds of online scams climb sharply every year. In 2024 alone, Americans aged 60+ reported almost $4.9 billion in losses to online scams, an i
ESET Expert
Nov 3, 2025


IT service desks: The security blind spot that may put your business at risk
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap. Supply chain risk is surging among global businesses. Verizon claims that third-party involvement in data breaches doubled over the past year to 30%. Yet usually this kind of risk is framed in terms of problems with open source components ( Log4Shell ), proprietary software (MOVEit) and bricks and mortar suppliers ( Synnovis ). Wh
ESET Expert
Oct 30, 2025


How MDR can give MSPs the edge in a competitive market
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs Managed service providers (MSPs) should be in a good place right now. As businesses continue to grow their digital operations, they increasingly need expert partners to help deploy and manage critical IT products and services. Nowhere is this need more pronounced than in cybersecurity. According to Canalys , revenue from managed se
ESET Expert
Oct 29, 2025


Recruitment red flags: Can you spot a spy posing as a job seeker?
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms Back in July 2024, cybersecurity vendor KnowBe4 began to observe suspicious activity linked to a new hire. The individual began manipulating and transferring potentially harmful files, and tried to execute unauthorized software. He was subsequently found out to be a North Korean worker who had tricked the firm’s HR team into gaining remote employment with t
ESET Expert
Oct 28, 2025


ESET Research analyzes a recent cyberespionage campaign linked toOperation DreamJob by North Korean Lazarus group
ESET researchers have recently observed a new instance of Operation DreamJob – a campaign that we track under the umbrella of North Korea-aligned Lazarus – in which several European companies active in the defense industry were targeted. Some of these are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea’s current efforts to scale up its drone program. This blogpost discusses the broader geopolitical impli
ESET Expert
Oct 24, 2025


This Cybersecurity Awareness Month, ESET Updates Its Home Security Portfolio for Advanced Ransomware and Scams
BRATISLAVA — October 21, 2025 — ESET , a global leader in cybersecurity solutions, today announces its upgraded consumer offering, ESET HOME Security and its Small Office/Home Office (SOHO) offering, ESET Small Business Security . Launched earlier in 2025 for businesses and enterprises, today’s release makes ESET’s award-winning Ransomware Remediation feature available to consumers and SOHOs. ESET Ransomware Remediation seamlessly creates encrypted backups - enabling users
ESET Expert
Oct 23, 2025
Tags
Newsletter
Follow us
Shop our products
bottom of page















