top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs. What do M&S and Co-op Group have in common? Aside from being among the UK’s most recognizable high street retailers, they were both recently the victims of a major ransomware breach. They were also both targeted by vishing attacks that elicited corporate passwords , providing their extorters with a critical foothold in the network. These identity-related breaches cost the two retailers over £
ESET Expert
Dec 9, 2025


Not so sexy: How to combat deepfakes and sextortion
AI deepfakes used for sextortion highlight a growing problem with consumer privacy — but are we ready to forgo our online comforts for...
ESET Expert
Aug 18, 2025


Cyber awareness training: How to improve your cyber resilience with a few clicks
The human element is still a crucial component of business cyber defense. Whether it is regular employees browsing the Internet, IT staff...
ESET Expert
Aug 14, 2025


When access becomes a risk: Cyber threats facing professional services
Professional services ensure success for their clients, but what about their own livelihoods? Their access is their bane, as threat...
ESET Expert
Aug 8, 2025


OK, computer: How to clean out your PC after malware
Cleaning your PC post-incident? Here are a few tips and tricks that should make your PC run like a well-oiled machine. Regular PC users...
ESET Expert
Aug 5, 2025


What is mobile spyware and how do I fight back?
Our mobile devices are the gateway to our digital lives. The price we pay for this convenience is that it makes our devices an attractive...
ESET Expert
Jul 23, 2025


Webmail services are under a barrage of XSS attacks. What SMBs need to know
XSS attacks are a prevalent threat but can be stopped at multiple stages, and businesses need only simple tools to do it. Due to their...
ESET Expert
Jun 25, 2025


Catching a phish with many faces
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized...
ESET Expert
May 12, 2025


EDR killers get popular. Here is how to stop them.
As ransomware actors increasingly turn to EDR killers, businesses need to tighten their security. Monitoring ransomware trends globally,...
ESET Expert
Mar 28, 2025


Dangerous liaisons in cybersecurity: Attackers improve their phishing methods
The latest ESET APT Activity Report shows improved phishing techniques that threat actors currently utilize, highlighting the need for...
ESET Expert
Mar 11, 2025
Tags
Newsletter
Follow us
Shop our products
bottom of page















