ESET Resource Center
Podcasts
PODCASTS
ESET Research Podcast: Threat Report H2 2023
Aryeh Goretsky and René Holt discuss ChatGPT, the MOVEit hack, Pandora and much more of what is described in the ESET Threat Report H2 2023. Listen and explore more!
PODCASTS
ESET Research Podcast: Neanderthals, Mammoths and Telekopye
In this episode, ESET researchers Radek Jizba and Jakub Souček talk about the Neanderthal groups and their scam techniques, and how they wield the cybercriminal tool Telekopye effectively. Listen now!
PODCASTS
ESET Research Podcast: Threat Report H1 2023
Aryeh Goretsky and Ondrej Kubovic discuss sextortion and text-based threats, brute force attacks on MS SQL servers, usury Android apps, Emotet activity, and RedLine Stealer disruption. Listen and learn more!
PODCASTS
MoustachedBouncer
Listen to ESET Director of Threat Research Jean-Ian Boutin explain the intricacies of MoustachedBouncer to ESET's host Aryeh Goretsky.
PODCASTS
Live from RSAC 2022 - Information security conference
Discover more about the use of artificial intelligence in the cybersecurity industry as well as the security of medical devices.
PODCASTS
Cybersecurity challenges according to a crypto exchange CISO
Listen to the discussion about technology, security challenges, and the role of crypto in emerging markets.
Don't miss out
PREMIUM CONTENT
WHITE PAPERS
Prevention first: Leveraging Cyber Threat Intelligence for Proactive Defense
Explore the current challenges of prevention, how closely is prevention intertwined with CTI, and what new features are part of the ESET Threat Intelligence. Read for free!
PREMIUM CONTENT
WHITE PAPERS
Cybersecurity in an AI-turbocharged Era
AI can be used for both good and evil. Find out how it transforms the world of digital security, how cybercriminals use it, and how ESET leverages the technology to keep you secured.
PREMIUM CONTENT
HANDBOOKS
Prevention first: Minimizing the Attack Surface and Closing Compliance Gaps
Prevention is key when protecting your company against threats. Learn about mobile protection, cloud protection, and the benefits of managing them from one console.
Ready for next step?
Enter the world of enterprise protection