Award-winning news, views, and insight from the ESET security community
Matthieu Faou • 15 May 2025 • 18 min. read
ESET Research
Operation RoundPress
Facundo Muñoz • 30 Apr 2025 • 11 min. read
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
Jakub Souček and Jan Holman • 26 Mar 2025 • 22 min. read
Shifting the sands of RansomHub’s EDRKillShifter
Business Security
Ransomware
Resilience in the face of ransomware: A key to business survival
Making it stick: How to get the most out of cybersecurity training
Video
Sednit abuses XSS flaws to hit gov't entities, defense companies
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU
Editor • 15 May 2025
ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities
Matthieu Faou • 15 May 2025
How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.
Editor • 12 May 2025
Scams
Catching a phish with many faces
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly
Camilo Gutiérrez Amaya • 09 May 2025
Beware of phone scams demanding money for ‘missed jury duty’
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer.
Phil Muncaster • 07 May 2025
Toll road scams are in overdrive: Here’s how to protect yourself
Have you received a text message about an unpaid road toll? Make sure you’re not the next victim of a smishing scam.
Phil Muncaster • 06 May 2025
RSAC 2025 wrap-up – Week in security with Tony Anscombe
From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions
Editor • 02 May 2025
ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks
Facundo Muñoz • 30 Apr 2025
This month in security with Tony Anscombe – April 2025 edition
From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity
Editor • 29 Apr 2025
Mobile Security
How safe and secure is your iPhone really?
Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
Phil Muncaster • 28 Apr 2025
Social Media
Deepfake 'doctors' take to TikTok to peddle bogus cures
Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements
Martina López and Tomáš Foltýn • 25 Apr 2025
How fraudsters abuse Google Forms to spread scams
The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.
Phil Muncaster • 23 Apr 2025
Sign up for our newsletters