top of page

Hello.
Explore content ranging from the simplest security practices in cyberspace to the latest malware research.
Search


Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths
ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play Since the...
ESET Expert
Dec 5, 2023


ESET APT Activity Report Q2–Q3 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 and Q3 2023 ESET APT Activity...
ESET Expert
Oct 27, 2023


Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible. ESET Research has been closely...
ESET Expert
Oct 26, 2023


ESET Research Podcast: Sextortion, digital usury and SQL brute-force
Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims...
ESET Expert
Sep 13, 2023


Recoveries and backups
NOTE: This blogpost is a revised version of an article requested from the author by Lenovo. This version has been updated with...
ESET Expert
Aug 14, 2023


ESET adds Vulnerability and Patch Management capability to ease the pressure on overloaded IT teams
As any IT admin would tell you, patching vulnerabilities is one of the most time-consuming tasks they must contend with. Plus, it is...
ESET Expert
Jul 25, 2023


ESET Threat Report: The remarkable adaptability of cyber criminals, the comeback of sextortion scams
The H1 2023 ESET Threat Report highlights the remarkable adaptability of cybercriminals: through exploiting vulnerabilities, gaining...
ESET Expert
Jul 11, 2023


ESET APT Activity Report T2 2022
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T2 2022 Today ESET Research publishes...
ESET Expert
Nov 15, 2022


I see what you did there: A look at the CloudMensis macOS spyware
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from...
ESET Expert
Jul 21, 2022


How can we support young people in harnessing technology for progress?
Young people are not passive victims of technology or helpless addicts. They are technology creators and agents with diverse backgrounds...
ESET Expert
Apr 21, 2022
Tags
Newsletter
Follow us
Shop our products
bottom of page















