News

ESET Chief Security Evangelist Tony Anscombe looks at cybersecurity stories that moved the needle, raised the alarms, or offered vital lessons in July 2025.
This issue of the ESET APT Activity Report reviews notable activities of APT group that were documented by ESET researchers from October 2024 until March 2025.
How scammers are exploiting DeepSeek's rise As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to ...
Deepfake 'doctors' take to TikTok to peddle bogus cures Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements ...
The H2 202 issue of ESET Threat Report reviews the key trends and developments that shaped the threat landscape from June to November 2024.
Left unchecked, AI's energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry without sacrificing performance?
ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor.
Attacks on the education sector are surging: How can cyber-defenders respond? Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right ...
ESET researchers uncover a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group we have named PlushDaemon.
So your friend has been hacked: Could you be next? When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
Watch out for these traps lurking in search results Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results ...
The evolving landscape of data privacy: Key trends to shape 2025 Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security ...