Latest Cybersecurity Articles

Privacy and Identity Protection

What is typosquatting, why does it matter, and how do I tackle it?

What is typosquatting, why does it matter, and how do I tackle it?

Privacy and Identity Protection

What is typosquatting, why does it matter, and how do I tackle it?

Typosquatting attacks abuse look-alike domains and user typos to steal credentials, spread malware and hijack traffic. Learn how modern typosquatting works in 2026, the main attack types, and how users, security teams and brands can prevent it.

Phil Muncaster12 Feb 2026


Compliance and Regulations

Buried in rules: How to stay ahead of compliance

Buried in rules: How to stay ahead of compliance

Compliance and Regulations

Buried in rules: How to stay ahead of compliance

There’s a duality to compliance, wherein it is both a growing burden, but also an excellent opportunity.

Márk Szabó09 Feb 2026


Endpoint Security and XDR

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

Endpoint Security and XDR

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

Learn what this recognition means for organizations seeking reliable, scalable endpoint protection.

Márk Szabó and James Shepperd06 Feb 2026


Family Safety Online

Help young gamers dodge Fortnite’s risks

Help young gamers dodge Fortnite’s risks

Family Safety Online

Help young gamers dodge Fortnite’s risks

Fortnite is more than just a popular game. It’s a social space where children play, communicate, and form habits that reach beyond the screen. What are its main risks, and how can parents help kids have a safer experience?

Roman Cuprik05 Feb 2026


What is

The most common scams small businesses should be aware of

The most common scams small businesses should be aware of

What is

The most common scams small businesses should be aware of

Scams get more sophisticated, and everyone is a target.

Roman Cuprik30 Jan 2026


What is

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

What is

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Sneaky tools that monitor your keystrokes have been around for decades. But what are keyloggers, how do they work, and how can you find and block them?

Ben Tudor29 Jan 2026


Threat landscape, Prevention and Awareness

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Threat landscape, Prevention and Awareness

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Developments around renewable energy are moving fast. How can the sector ensure that cybersecurity keeps up in face of destructive attacks?

Márk Szabó and James Shepperd27 Jan 2026


Prevention and Awareness

What if? Security through the eyes of an attacker

What if? Security through the eyes of an attacker

Prevention and Awareness

What if? Security through the eyes of an attacker

There’s a version of your company only attackers ever see. It’s time you met it.

Márk Szabó26 Jan 2026


What is

How social engineering attacks work: Psychology, tactics, and real examples

How social engineering attacks work: Psychology, tactics, and real examples

What is

How social engineering attacks work: Psychology, tactics, and real examples

Why cybersecurity is no longer just about code – it’s about psychology.

Ben Tudor20 Jan 2026


Prevention and Awareness

Muddying the inbox: The hidden dangers of internal spearphishing

Muddying the inbox: The hidden dangers of internal spearphishing

Prevention and Awareness

Muddying the inbox: The hidden dangers of internal spearphishing

The latest ESET research sheds light on an advanced phishing technique that SOCs might find hard to catch.

Márk Szabó15 Jan 2026


What is

VPN vs. proxy: The definitive guide to digital security and privacy

VPN vs. proxy: The definitive guide to digital security and privacy

What is

VPN vs. proxy: The definitive guide to digital security and privacy

Using the internet today is fraught with risk. Rising cybercrime, invasive advertising, and government surveillance have made us more aware of security and privacy. While regulations like GDPR and CCPA aim to protect our rights, not all organizations play fair.

Phil Muncaster15 Jan 2026


Family Safety Online

Raising confident YouTube kids: A parent's safety guide for 2026

Raising confident YouTube kids: A parent's safety guide for 2026

Family Safety Online

Raising confident YouTube kids: A parent's safety guide for 2026

Help your child understand YouTube, set healthy boundaries, and guide them toward safe, confident viewing habits.

Roman Cuprik07 Jan 2026


Prevention first cybersecurity as a service
ESET Home Security