ESET Resource Center

Podcasts

PODCASTS


ESET Research Podcast: Threat Report H2 2023

Aryeh Goretsky and René Holt discuss ChatGPT, the MOVEit hack, Pandora and much more of what is described in the ESET Threat Report H2 2023. Listen and explore more!

PODCASTS


ESET Research Podcast: Neanderthals, Mammoths and Telekopye

In this episode, ESET researchers Radek Jizba and Jakub Souček talk about the Neanderthal groups and their scam techniques, and how they wield the cybercriminal tool Telekopye effectively. Listen now!

PODCASTS


ESET Research Podcast: Threat Report H1 2023

Aryeh Goretsky and Ondrej Kubovic discuss sextortion and text-based threats, brute force attacks on MS SQL servers, usury Android apps, Emotet activity, and RedLine Stealer disruption. Listen and learn more!

PODCASTS


MoustachedBouncer

Listen to ESET Director of Threat Research Jean-Ian Boutin explain the intricacies of MoustachedBouncer to ESET's host Aryeh Goretsky.

PODCASTS


Live from RSAC 2022 - Information security conference

Discover more about the use of artificial intelligence in the cybersecurity industry as well as the security of medical devices.

PODCASTS


Cybersecurity challenges according to a crypto exchange CISO

Listen to the discussion about technology, security challenges, and the role of crypto in emerging markets.

Don't miss out

PREMIUM CONTENT

WHITE PAPERS


Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense

Explore the current challenges of prevention, how closely is prevention intertwined with CTI, and what new features are part of the ESET Threat Intelligence. Read for free!

PREMIUM CONTENT

WHITE PAPERS


Cybersecurity in an AI-turbocharged Era

AI can be used for both good and evil. Find out how it transforms the world of digital security, how cybercriminals use it, and how ESET leverages the technology to keep you secured.

PREMIUM CONTENT

HANDBOOKS


Prevention first: Minimizing the Attack Surface and Closing Compliance Gaps

Prevention is key when protecting your company against threats. Learn about mobile protection, cloud protection, and the benefits of managing them from one console.
 

Ready for next step?

Enter the world of enterprise protection