top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs. What do M&S and Co-op Group have in common? Aside from being among the UK’s most recognizable high street retailers, they were both recently the victims of a major ransomware breach. They were also both targeted by vishing attacks that elicited corporate passwords , providing their extorters with a critical foothold in the network. These identity-related breaches cost the two retailers over £
ESET Expert
Dec 9, 2025


How to keep train security on track
The arrival of threat actors on the railway scene may cause some lengthy delays and several late departures. The arrival of threat actors on the railway scene may cause some lengthy delays and several late departures. Trains are strategic elements of state infrastructure, especially in the U.S., which has the longest total rail network in the world. While mostly focused on freight , it provides around 167,000 jobs. A legacy of the industrial revolution, trains bring benefits
ESET Expert
Dec 3, 2025


The OSINT playbook: Find your weak spots before attackers do
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots Whatever the reason, we spend vast amounts of time online, tapping into the untold expanse of information, communication and resources. Sometimes, the challenge isn’t finding some data, but knowing what’s relevant, real and worth trusting. Anyone working with information needs to be able to cut through the noise and discern the au
ESET Expert
Nov 24, 2025


Why shadow AI could be your biggest security blind spot
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company Shadow IT has long been a thorn in the side of corporate security teams. After all, you can’t manage or protect what you can’t see. But things could be about to get a lot worse. The scale, reach and power of artificial intelligence (AI) should make shadow AI a concern for any IT or security leader. Cyber risk thrives in the dark spaces between acceptable use po
ESET Expert
Nov 17, 2025


How to secure aviation’s connected systems
In aviation, getting more connected might take on a dangerous dimension. There are three aspects to the aviation sector that assign it great value — IP and R&D ; the human factor (e.g., talent, capacity); and finally, the connected IT systems (and their data) used to harness and scale the potency of moving people and things farther and faster. The interdependence between aircraft, airports and global supply chains comprise multiple complex connected systems. These include eve
ESET Expert
Nov 13, 2025


Ground zero: 5 things to do after discovering a cyberattack
When every minute counts, preparation and precision can mean the difference between disruption and disaster Network defenders are feeling the heat. The number of data breaches Verizon investigated last year, as a share of overall incidents, was up 20 percentage points on the previous year. This need not be as catastrophic as it sounds, as long as teams are able to respond rapidly and decisively to intrusions. But those first minutes and hours are critical. Preparation is the
ESET Expert
Nov 10, 2025


Your passwords and credit cards are their loot: How infostealers work
At ESET’s annual technology conference ETeC 2025, malware researcher Jakub Kaloč explained how cybercriminals run infostealers as a service via a real-life demonstration. An admin comes to work, opens a dashboard and checks for tasks, notifications, and revenue statistics. You’re thinking of a software as a service company (SaaS), right? Not quite. This scene shows how modern cybercrime focused on data theft looks. And you are its target. Infostealers are on the rise, threate
ESET Expert
Nov 5, 2025


How to protect valuable aviation and aerospace IP and R&D
You can’t soar when your secrets are leaking below. When the United States initiated the Advanced Technology Bomber program, better known as the B-2 Spirit, in the 1970s, the fast track to a cutting-edge stealth bomber tracked to the fact that the Northrop Corporation already had experience with mature flying-wing designs, which enabled the necessary low radar signature, as far back as 1942 1 . Those prototypes, the Northrop XB-35 and YB-35B , were clearly reflected in the co
ESET Expert
Nov 4, 2025


Fraud prevention: How to help older family members avoid scams
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically When we talk about fraud that can inflict a severe financial and emotional toll on the victims, it’s not hyperbole. One area where this is increasingly evident is elder fraud, as the amounts of money lost to various kinds of online scams climb sharply every year. In 2024 alone, Americans aged 60+ reported almost $4.9 billion in losses to online scams, an i
ESET Expert
Nov 3, 2025


IT service desks: The security blind spot that may put your business at risk
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap. Supply chain risk is surging among global businesses. Verizon claims that third-party involvement in data breaches doubled over the past year to 30%. Yet usually this kind of risk is framed in terms of problems with open source components ( Log4Shell ), proprietary software (MOVEit) and bricks and mortar suppliers ( Synnovis ). Wh
ESET Expert
Oct 30, 2025
Tags
Newsletter
Follow us
Shop our products
bottom of page















