News

ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive ...
ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025 and beyond.
From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of ...
The H1 2025 issue of the ESET Threat Report reviews the key trends and developments that shaped the threat landscape from ...
Ce rapport apporte un éclairage sur le paysage des menaces au premier semestre 2025, à partir des éléments de la télémétrie d ...
Méfiez-vous des « TikDocs » générés par IA qui exploitent la confiance du public envers la profession médicale pour ...
Danabot: Analyzing a fallen empire. ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation ...
This issue of the ESET APT Activity Report reviews notable activities of APT group that were documented by ESET researchers from October 2024 until March 2025.
Sednit abuses XSS flaws to hit gov't entities, defense companies. Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations ...
Deepfake 'doctors' take to TikTok to peddle bogus cures. Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements ...
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.
The computer scientist and AI researcher Mária Bieliková shares her thoughts on the technologys potential and pitfalls – and what may lie ahead for us.