Stay ahead of digital threats with insights from a cybersecurity leader
Márk Szabó • 01 Apr 2026 • 10 min. read
Prevention and Awareness
How to take legacy operational technology (OT) risks in manufacturing head-on
Roman Cuprik • 31 Mar 2026 • 9 min. read
Cloud and Application Security
Phishing is now more dangerous than ever. Businesses need new tools.
Phil Muncaster • 30 Mar 2026 • 11 min. read
Privacy and Identity Protection
Sextortion explained: How to keep yourself and your family safe
Threat landscape
Too big to ignore? The security crisis brewing in AI agent platforms
How to remove your personal information from the internet: A step-by-step guide
Compliance and Regulations
What Common Criteria Certification means for ESET Endpoint Security
When it comes to IT security technologies, independent tests and certifications help decision-makers assess solutions and evaluate their performance.
André Lameiras • 02 Apr 2026
Do you know how to bridge the gap between legacy risks and modern security needs?
Márk Szabó • 01 Apr 2026
ESET boosts its Anti-Phishing with detection of malicious QR codes and calendar invites.
Roman Cuprik • 31 Mar 2026
We all know not to believe everything we read online. But when an email lands in your inbox from someone claiming to have compromiing images of you, reason tends to go out of the window.
Phil Muncaster • 30 Mar 2026
Why threat intelligence is at the heart of security integration
Security analysts don’t need more noise. They need intelligence that’s fit for purpose, integrates, and delivers clarity without friction.
Márk Szabó • 25 Mar 2026
Threat Intelligence
Go beyond reactive cybersecurity, sharpen your defenses with eCrime threat intelligence reports
Ransomware groups are growing bolder, and attacks are at record highs. Businesses now need threat intelligence to boost traditional cybersecurity defenses.
Roman Cuprik • 24 Mar 2026
Cloud and Application Security, Compliance and Regulations
In the crosshairs: Securing cloud workloads with bespoke solutions
With regulations like DORA, third-party risk gains new consequences.
Márk Szabó • 23 Mar 2026
What we found after scanning 60 thousand skills for AI agents, and how to put guardrails in place.
ESET Research • 20 Mar 2026
Is it safe to buy from Shein?
Large e-commerce platforms and their databases are always popular targets for cybercriminals.
Ben Tudor • 17 Mar 2026
Strong enough to lead: Navigating resilience in IT Security
What is core-code for leadership in IT security? Investing in resilience and trust.
Viktória Ivanová • 16 Mar 2026
You’ve got mail: How to secure your Microsoft Exchange server
Are email servers doomed to eternal vulnerability? International cybersecurity partners think otherwise.
Márk Szabó • 11 Mar 2026
Your digital footprint reveals personal data that puts your security and privacy at risk. Here’s how to audit your exposure, remove PII, and stop it from resurfacing.
Phil Muncaster • 10 Mar 2026
Sign up for our newsletters
Thank you! Please check your email and confirm your subscription.