Latest Cybersecurity Articles

Compliance and Regulations

What Common Criteria Certification means for ESET Endpoint Security

What Common Criteria Certification means for ESET Endpoint Security

Compliance and Regulations

What Common Criteria Certification means for ESET Endpoint Security

When it comes to IT security technologies, independent tests and certifications help decision-makers assess solutions and evaluate their performance.

André Lameiras02 Apr 2026


Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

How to take legacy operational technology (OT) risks in manufacturing head-on

Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

Do you know how to bridge the gap between legacy risks and modern security needs?

Márk Szabó01 Apr 2026


Cloud and Application Security

Phishing is now more dangerous than ever. Businesses need new tools.

Phishing is now more dangerous than ever. Businesses need new tools.

Cloud and Application Security

Phishing is now more dangerous than ever. Businesses need new tools.

ESET boosts its Anti-Phishing with detection of malicious QR codes and calendar invites.

Roman Cuprik31 Mar 2026


Privacy and Identity Protection

Sextortion explained: How to keep yourself and your family safe

Sextortion explained: How to keep yourself and your family safe

Privacy and Identity Protection

Sextortion explained: How to keep yourself and your family safe

We all know not to believe everything we read online. But when an email lands in your inbox from someone claiming to have compromiing images of you, reason tends to go out of the window.

Phil Muncaster30 Mar 2026


Threat landscape

Why threat intelligence is at the heart of security integration

Why threat intelligence is at the heart of security integration

Threat landscape

Why threat intelligence is at the heart of security integration

Security analysts don’t need more noise. They need intelligence that’s fit for purpose, integrates, and delivers clarity without friction.

Márk Szabó25 Mar 2026


Threat Intelligence

Go beyond reactive cybersecurity, sharpen your defenses with eCrime threat intelligence reports

Go beyond reactive cybersecurity, sharpen your defenses with eCrime threat intelligence reports

Threat Intelligence

Go beyond reactive cybersecurity, sharpen your defenses with eCrime threat intelligence reports

Ransomware groups are growing bolder, and attacks are at record highs. Businesses now need threat intelligence to boost traditional cybersecurity defenses.

Roman Cuprik24 Mar 2026


Cloud and Application Security, Compliance and Regulations

In the crosshairs: Securing cloud workloads with bespoke solutions

In the crosshairs: Securing cloud workloads with bespoke solutions

Cloud and Application Security, Compliance and Regulations

In the crosshairs: Securing cloud workloads with bespoke solutions

With regulations like DORA, third-party risk gains new consequences.

Márk Szabó23 Mar 2026


Threat landscape

Too big to ignore? The security crisis brewing in AI agent platforms

Too big to ignore? The security crisis brewing in AI agent platforms

Threat landscape

Too big to ignore? The security crisis brewing in AI agent platforms

What we found after scanning 60 thousand skills for AI agents, and how to put guardrails in place.

ESET Research20 Mar 2026


Privacy and Identity Protection

Is it safe to buy from Shein?

Is it safe to buy from Shein?

Privacy and Identity Protection

Is it safe to buy from Shein?

Large e-commerce platforms and their databases are always popular targets for cybercriminals.

Ben Tudor17 Mar 2026


Prevention and Awareness

Strong enough to lead: Navigating resilience in IT Security

Strong enough to lead: Navigating resilience in IT Security

Prevention and Awareness

Strong enough to lead: Navigating resilience in IT Security

What is core-code for leadership in IT security? Investing in resilience and trust.

Viktória Ivanová16 Mar 2026


Prevention and Awareness

You’ve got mail: How to secure your Microsoft Exchange server

You’ve got mail: How to secure your Microsoft Exchange server

Prevention and Awareness

You’ve got mail: How to secure your Microsoft Exchange server

Are email servers doomed to eternal vulnerability? International cybersecurity partners think otherwise.

Márk Szabó11 Mar 2026


Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

How to remove your personal information from the internet: A step-by-step guide

Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

Your digital footprint reveals personal data that puts your security and privacy at risk. Here’s how to audit your exposure, remove PII, and stop it from resurfacing.

Phil Muncaster10 Mar 2026


Prevention first cybersecurity as a service
ESET Home Security