Award-winning news, views, and insight from the ESET security community
Facundo Muñoz • 22 Jan 2025 • 9 min. read
ESET Research
PlushDaemon compromises supply chain of Korean VPN service
Martin Smolár • 16 Jan 2025 • 12 min. read
Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344
ESET Research • 20 Dec 2024 • 1 min. read
ESET Research Podcast: Telekopye, again
Business Security
Untangling the hiring dilemma: How security solutions free up HR processes
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
Kids Online
Gaming or gambling? Lifting the lid on in-game loot boxes
The virtual treasure chests and other casino-like rewards inside your children’s games may pose risks you shouldn’t play down
Editor • 13 Feb 2025
Video
What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)
Ever wondered what it's like to hack for a living – legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security.
Editor • 12 Feb 2025
Scams
How AI-driven identify fraud is causing havoc
Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here's how to fight back
Phil Muncaster • 11 Feb 2025
WeLiveScience
Neil Lawrence: What makes us unique in the age of AI | Starmus highlights
As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms large: what remains uniquely human?
Editor • 10 Feb 2025
Patch or perish: How organizations can master vulnerability management
Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching
Phil Muncaster • 05 Feb 2025
Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlights
Left unchecked, AI's energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry without sacrificing performance?
Editor • 04 Feb 2025
Digital Security
How scammers are exploiting DeepSeek's rise
As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to know before using DeepSeek
Editor • 31 Jan 2025
This month in security with Tony Anscombe – January 2025 edition
DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal another eventful year in cybersecurity and data privacy
Editor • 30 Jan 2025
Untrustworthy AI: How to deal with data poisoning
You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so
Márk Szabó • 30 Jan 2025
Brian Greene: Until the end of time | Starmus highlights
The renowned physicist explores how time and entropy shape the evolution of the universe, the nature of existence, and the eventual fate of everything, including humanity
Editor • 29 Jan 2025
Going (for) broke: 6 common online betting scams and how to avoid them
Don’t roll the dice on your online safety – watch out for bogus sports betting apps and other traps commonly set by scammers
Phil Muncaster • 28 Jan 2025
The evolving landscape of data privacy: Key trends to shape 2025
Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams
Phil Muncaster • 23 Jan 2025
Sign up for our newsletters