top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Don´t skip out on this Back to School supply
Yes, you heard it. Back to School is officially here. Most parents are relieved, and most children are horrified. And yet, there is at...
ESET Expert
Aug 31, 2023


Cyber Threat Intelligence: A Comprehensive Guide to Your Threat Defense
The adoption of cyber threat intelligence (CTI) capabilities is one of the most impactful ways to stay informed and well-equipped in...
ESET Expert
Aug 30, 2023


Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?
The campaign started with a trojanized version of unsupported financial software. The compromise of the 3CX communication software made...
ESET Expert
Aug 29, 2023


A Bard’s Tale – how fake AI bots try to install malware
The AI race is on! It’s easy to lose track of the latest developments and possibilities, and yet everyone wants to see firsthand what...
ESET Expert
Aug 28, 2023


Mitigating risk – data loss prevention helps prevent security disasters
Organizations have increasingly become targets of hacking that result in massive data breaches, calling to attention both the...
ESET Expert
Aug 25, 2023


The grand theft of Jake Moore’s voice: The concept of a virtual kidnap
With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some...
ESET Expert
Aug 25, 2023


Do you need to sacrifice privacy for security?
It is a commonly held belief of many people that using software that watches what happens on their devices means giving up their privacy....
ESET Expert
Aug 24, 2023


IDC Market Perspective:How Global Threat Intelligence Vendors Address the Nuances of Regional Market
In its 2023 study called “Market Perspective: How Global Threat Intelligence Vendors Address the Nuances of Regional Markets”,...
ESET Expert
Aug 21, 2023


Getting rid of unwanted browser notifications
NOTE: This blog post is a revised version of an article requested from the author by Lenovo. This version has been updated with...
ESET Expert
Aug 18, 2023


Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence
Current LLMs are just not mature enough for high-level tasks Mention the term ‘cyberthreat intelligence’ (CTI) to cybersecurity teams of...
ESET Expert
Aug 17, 2023
Tags
Newsletter
Shop our products
bottom of page











