top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Under lock and key: Safeguarding business data with encryption
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is...
ESET Expert
Sep 5, 2025


ESET named a Strong Performer in independent evaluation of MDR services in Europe
ESET, a global leader in cybersecurity, has been named a Strong Performer in The Forrester Wave™: Managed Detection And Response Services...
ESET Expert
Sep 4, 2025


First known AI-powered ransomware uncovered by ESET Research
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats ESET researchers have discovered what they called "the first known AI-powered ransomware". The malware, which ESET has named PromptLock, has the ability to exfiltrate, encrypt and possibly even destroy data, though this last functionality appears not to have been implemented in the malware yet. While PromptLock was not spotted in actual attacks and is instead though
ESET Expert
Aug 28, 2025


The need for speed: Why organizations are turning to rapid, trustworthy MDR
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries. How long does it take for threat actors to move from initial access to lateral movement? Days? Hours? Unfortunately, the answer for many organizations is increasingly “minutes.” In fact, at 48 minutes, the average breakout time in 2024 was 22% shorter than the previous year, according to one report . Adding to the concerns is another figure f
ESET Expert
Aug 22, 2025


Investors beware: AI-powered financial scams swamp social media
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think. As economic...
ESET Expert
Aug 19, 2025


Not so sexy: How to combat deepfakes and sextortion
AI deepfakes used for sextortion highlight a growing problem with consumer privacy — but are we ready to forgo our online comforts for...
ESET Expert
Aug 18, 2025


Cyber awareness training: How to improve your cyber resilience with a few clicks
The human element is still a crucial component of business cyber defense. Whether it is regular employees browsing the Internet, IT staff...
ESET Expert
Aug 14, 2025


When access becomes a risk: Cyber threats facing professional services
Professional services ensure success for their clients, but what about their own livelihoods? Their access is their bane, as threat...
ESET Expert
Aug 8, 2025


OK, computer: How to clean out your PC after malware
Cleaning your PC post-incident? Here are a few tips and tricks that should make your PC run like a well-oiled machine. Regular PC users...
ESET Expert
Aug 5, 2025


Why the tech industry needs to stand firm on preserving end-to-end encryption
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to...
ESET Expert
Aug 4, 2025
Tags
Newsletter
Follow us
Shop our products
bottom of page















