News

Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate ...
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation, one of the most ...
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the ...
From the power of collaborative defense to identity security and AI, catch up on the event's key themes with ESET Chief Security Evangelist Tony Anscombe.
Chances are high that many people think, “it’s an iPhone, so I’m safe”. Apple’s control over its device and app ecosystem has indeed historically been tight, with its walled-garden ...
Have you received a text message about an unpaid road toll? You’re not alone. Make sure you’re not the next victim of a ...
In this blogpost, ESET researchers provide an analysis of Spellbinder, a lateral movement tool for performing adversary-in-the-middle attacks, used by the China-aligned threat actor that we have ...
From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity ...
Once confined to research labs, generative AI is now available to anyone – including those with ill intentions, who use AI tools not to spark creativity, but to fuel deception instead.