Roman Cuprik

Roman Cuprik

Security Writer


Education?
M.A. in Journalism

Position and history at ESET?
I joined ESET in 2023 as a content writer.

What malware do you hate the most?
Ransomware that attacks particularly vulnerable facilities such as hospitals and thus threatens human lives and health.

Favorite activities?
Fitness, running, reading, and gaming.

What is your golden rule for cyberspace?
Healthy paranoia.

When did you get your first computer and what kind was it?
As a child I played games on my father’s computers. I only remember that the oldest one run Windows 95. My first ever computer was Lenovo ThinkPad that I got back in the 2000s.

Favorite computer game/activity?
I am huge fan of historical strategic games and RPGs with a good story.


67 articles by Roman Cuprik

Cybersecurity Protection

Why are voters good targets for cybercriminals — and how can they stay cyber safe during elections

Why are voters good targets for cybercriminals — and how can they stay cyber safe during elections

Cybersecurity Protection

Why are voters good targets for cybercriminals — and how can they stay cyber safe during elections

Elections, like other mass events, offer broad opportunities for threat actors to target consumers and businesses. Governments need to be prepared.

Roman Cuprik31 May 20247 min. read


Prevention and Awareness

ESET WORLD 2024: Building a proactive defense strategy featuring Forrester’s Madelein van der Hout

ESET WORLD 2024: Building a proactive defense strategy featuring Forrester’s Madelein van der Hout

Prevention and Awareness

ESET WORLD 2024: Building a proactive defense strategy featuring Forrester’s Madelein van der Hout

Threat actors are developing new tools, phishing is getting more sophisticated, and AI is finally here. Organizations need to adapt and be proactive.

Roman Cuprik29 May 20246 min. read


Threat landscape

Armor your Achilles’ heel. Reduce your business' attack surface vectoring from employee mobile devices

Armor your Achilles’ heel. Reduce your business' attack surface vectoring from employee mobile devices

Threat landscape

Armor your Achilles’ heel. Reduce your business' attack surface vectoring from employee mobile devices

The number of Android threats detected by ESET telemetry in the past four years has tripled.

Roman Cuprik27 May 20245 min. read


Threat landscape

ESET WORLD 2024: Europeans face evolving cyberthreats. Defense strategies need to be robust and pragmatic

ESET WORLD 2024: Europeans face evolving cyberthreats. Defense strategies need to be robust and pragmatic

Threat landscape

ESET WORLD 2024: Europeans face evolving cyberthreats. Defense strategies need to be robust and pragmatic

Guest speaker, Forrester Sr. analyst Tope Olufon explains how to stay resilient in Europe’s fluid threat landscape.

Roman Cuprik23 May 20245 min. read


Threat landscape

Preparing for UEFI bootkits. ESET discovery shows the importance of cyber intelligence

Preparing for UEFI bootkits. ESET discovery shows the importance of cyber intelligence

Threat landscape

Preparing for UEFI bootkits. ESET discovery shows the importance of cyber intelligence

Some threats bypass standard security tools. In such cases, security operators capable of deep analysis are needed.

Roman Cuprik08 May 20245 min. read


Device Protection

Imagine vacationing without a smartphone — cybercriminals can’t

Imagine vacationing without a smartphone — cybercriminals can’t

Device Protection

Imagine vacationing without a smartphone — cybercriminals can’t

With all of the fake websites and apps out there, critical cybersecurity for travelers begins at home before the trip even starts.

Roman Cuprik26 Apr 20243 min. read


Threat landscape

Spray-and-pray tactics get an upgrade. MSPs face advanced phishing

Spray-and-pray tactics get an upgrade. MSPs face advanced phishing

Threat landscape

Spray-and-pray tactics get an upgrade. MSPs face advanced phishing

Cybercriminals leverage AceCryptor and Rescoms (RAT) to upgrade spam phishing messages difficult to recognize by both humans and machines. To defend, MSPs automate protection.

Roman Cuprik23 Apr 20246 min. read


Cybersecurity Protection

Even legitimate websites can become traps, and small/home offices need to be prepared

Even legitimate websites can become traps, and small/home offices need to be prepared

Cybersecurity Protection

Even legitimate websites can become traps, and small/home offices need to be prepared

One’s personal digital life may be a threat to business. Small offices and home offices need proper prevention.

Roman Cuprik17 Apr 20245 min. read


Threat landscape

I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine

I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine

Threat landscape

I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine

Since the invasion started, ESET has both investigated and prevented a significant number of attacks launched by Russia-aligned groups against Ukraine.

Roman Cuprik21 Feb 20246 min. read