News
The computer scientist and AI researcher Mária Bieliková shares her thoughts on the technologys potential and pitfalls – and what may lie ahead for us.
This issue of the ESET APT Activity Report reviews notable activities of APT group that were documented by ESET researchers from October 2024 until March 2025.
Deepfake 'doctors' take to TikTok to peddle bogus cures. Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements ...
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.
StrongPity espionage campaign targeting Android users. ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the ...
How fraudsters abuse Google Forms to spread scams. The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.
From the time a CVE is released that’s exploitable, or a new technique rolled out, you’ll have to think quick – I hope you’re ready.
Your iPhone isn’t necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
Watch out for these traps lurking in search results. Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results ...
So your friend has been hacked: Could you be next? When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
They’re coming for your data: What are infostealers and how do I stay safe? Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest ...
GoldenJackal used a custom toolset to target air-gapped systems at a South Asian embassy in Belarus since at least August 2019. In this blogpost, we describe these tools publicly for the first time.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results