Latest Cybersecurity Articles

What is

Understanding DDoS attacks: a comprehensive guide

Understanding DDoS attacks: a comprehensive guide

What is

Understanding DDoS attacks: a comprehensive guide

DDoS attacks are the loud side of cybercrime – designed to flood, crash, and cripple online services. Here’s what they are, how they work, and how you can stay protected.

Ben Tudor11 Dec 2025


Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

NOTE: The views and opinions expressed in this blogpost are those of ESET and do not necessarily reflect the views or positions of the MITRE Corporation.

Márk Szabó, James Shepperd, Ben Tudor10 Dec 2025


Cloud and Application Security

Keeping your business strong amidst Microsoft Partner Program and volume discount changes

Keeping your business strong amidst Microsoft Partner Program and volume discount changes

Cloud and Application Security

Keeping your business strong amidst Microsoft Partner Program and volume discount changes

If you’re a Microsoft business customer or a Microsoft Partner, you’ll be aware life is about to get more expensive.

Editorial Team09 Dec 2025


Prevention and Awareness

Clear for takeoff: Building cyber resilience in commercial aviation

Clear for takeoff: Building cyber resilience in commercial aviation

Prevention and Awareness

Clear for takeoff: Building cyber resilience in commercial aviation

Reminder: If someone asks for sensitive information without proper clearance, treat it like an unauthorized passenger — deny boarding immediately.

Márk Szabó07 Dec 2025


Family Safety Online

How to keep your child’s data safe and secure

How to keep your child’s data safe and secure

Family Safety Online

How to keep your child’s data safe and secure

Teach your child to protect their data, and explain the value of their online identity.

Roman Cuprik04 Dec 2025


Privacy and Identity Protection

Breaking down Telegram’s privacy promise: What’s protected and what’s not

Breaking down Telegram’s privacy promise: What’s protected and what’s not

Privacy and Identity Protection

Breaking down Telegram’s privacy promise: What’s protected and what’s not

Telegram may look like a secure messenger app, but when it comes to users at higher-risk and when there is confidential information involved, it has several serious security blind spots. This article breaks down how Telegram works, where its weak spots are, and which alternatives offer better security.

Editorial Team02 Dec 2025


Threat landscape

How to keep train security on track

How to keep train security on track

Threat landscape

How to keep train security on track

The arrival of threat actors on the railway scene may cause some lengthy delays and several late departures.

Márk Szabó01 Dec 2025


Device Protection

This shopping season will be different. Prepare for AI-powered scams targeting Android

This shopping season will be different. Prepare for AI-powered scams targeting Android

Device Protection

This shopping season will be different. Prepare for AI-powered scams targeting Android

Cybercriminals can utilize new AI-powered threats for Android before Christmas. Learn how to avoid them.

Roman Cuprik28 Nov 2025


What is

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

What is

Two-Factor Authentication (2FA): What it is, how it works, and why it matters

Two-factor authentication (2FA) adds a second layer of login security. Discover the best methods and how to enable them.

Phil Muncaster20 Nov 2025


Endpoint Security and XDR

AV-Comparatives certifies ESET PROTECT Enterprise and its utility in meeting cyber resilience in both performance and cost

AV-Comparatives certifies ESET PROTECT Enterprise and its utility in meeting cyber resilience in both performance and cost

Endpoint Security and XDR

AV-Comparatives certifies ESET PROTECT Enterprise and its utility in meeting cyber resilience in both performance and cost

AV-Comparatives Endpoint Prevention and Response (EPR) Comparative Report 2025 shows that the ESET PROTECT platform delivers on prevention and response.

James Shepperd19 Nov 2025


Privacy and Identity Protection

What to do if your Facebook account is hacked

What to do if your Facebook account is hacked

Privacy and Identity Protection

What to do if your Facebook account is hacked

How to secure and recover a hacked Facebook account with the minimum of stress.

Ben Tudor13 Nov 2025


MDR & Services

ETeC 2025: Living in the trenches with ESET MDR

ETeC 2025: Living in the trenches with ESET MDR

MDR & Services

ETeC 2025: Living in the trenches with ESET MDR

Join us for another “Story time with James” and hear more about what ESET MDR can see and do for you.

Márk Szabó12 Nov 2025


Prevention first cybersecurity as a service
ESET Home Security