Latest Cybersecurity Articles

Device Protection

What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?

What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?

Device Protection

What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?

Part social engineering, part sneaky payload, trojans are popular with attackers because they’re powerful, flexible tools for compromising victims. Here’s what to look for – and simple steps to avoid falling for them.

Ben Tudor16 Apr 2026


Prevention and Awareness

Cyber resilience strategy in 2026: A practical guide for modern businesses

Cyber resilience strategy in 2026: A practical guide for modern businesses

Prevention and Awareness

Cyber resilience strategy in 2026: A practical guide for modern businesses

By 2026, one truth has become unavoidable: security is no longer about being unhackable, it’s about being unbreakable.

Jakub Filip15 Apr 2026


Identity and Data Protection

Zero Trust model explained: Why “never trust, always verify” matters more than ever

Zero Trust model explained: Why “never trust, always verify” matters more than ever

Identity and Data Protection

Zero Trust model explained: Why “never trust, always verify” matters more than ever

This article breaks down what Zero Trust means in 2026, how it has evolved, and why adoption has become an urgent strategic priority.

Jakub Filip13 Apr 2026


Threat landscape

What are EDR killers? How ransomware attacks disable EDR and how to stop it

What are EDR killers? How ransomware attacks disable EDR and how to stop it

Threat landscape

What are EDR killers? How ransomware attacks disable EDR and how to stop it

A practical guide to EDR killers and the tactics ransomware groups use to blind endpoint defenses.

Roman Cuprik09 Apr 2026


Family Safety Online

Chat apps for kids: A parent’s guide to getting it right

Chat apps for kids: A parent’s guide to getting it right

Family Safety Online

Chat apps for kids: A parent’s guide to getting it right

Messaging apps open exciting social worlds for kids, but parental guidance is still advised. How to make chatting apps a safe space?

Roman Cuprik09 Apr 2026


Prevention and Awareness

Why zero trust is critical for healthcare cybersecurity

Why zero trust is critical for healthcare cybersecurity

Prevention and Awareness

Why zero trust is critical for healthcare cybersecurity

Despite pressure from regulators and diligent efforts to bolster cybersecurity, attacks are common and healthcare organizations remain at substantial risk.

Márk Szabó and Jakub Filip07 Apr 2026


Compliance and Regulations

What Common Criteria Certification means for ESET Endpoint Security

What Common Criteria Certification means for ESET Endpoint Security

Compliance and Regulations

What Common Criteria Certification means for ESET Endpoint Security

When it comes to IT security technologies, independent tests and certifications help decision-makers assess solutions and evaluate their performance.

André Lameiras02 Apr 2026


Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

How to take legacy operational technology (OT) risks in manufacturing head-on

Prevention and Awareness

How to take legacy operational technology (OT) risks in manufacturing head-on

Do you know how to bridge the gap between legacy risks and modern security needs?

Márk Szabó01 Apr 2026


Cloud and Application Security

Phishing is now more dangerous than ever. Businesses need new tools.

Phishing is now more dangerous than ever. Businesses need new tools.

Cloud and Application Security

Phishing is now more dangerous than ever. Businesses need new tools.

ESET boosts its Anti-Phishing with detection of malicious QR codes and calendar invites.

Roman Cuprik31 Mar 2026


Privacy and Identity Protection

Sextortion explained: How to keep yourself and your family safe

Sextortion explained: How to keep yourself and your family safe

Privacy and Identity Protection

Sextortion explained: How to keep yourself and your family safe

We all know not to believe everything we read online. But when an email lands in your inbox from someone claiming to have compromiing images of you, reason tends to go out of the window.

Phil Muncaster30 Mar 2026


Threat landscape

Why threat intelligence is at the heart of security integration

Why threat intelligence is at the heart of security integration

Threat landscape

Why threat intelligence is at the heart of security integration

Security analysts don’t need more noise. They need intelligence that’s fit for purpose, integrates, and delivers clarity without friction.

Márk Szabó25 Mar 2026


Threat Intelligence

Go beyond reactive cybersecurity, sharpen your defenses with eCrime threat intelligence reports

Go beyond reactive cybersecurity, sharpen your defenses with eCrime threat intelligence reports

Threat Intelligence

Go beyond reactive cybersecurity, sharpen your defenses with eCrime threat intelligence reports

Ransomware groups are growing bolder, and attacks are at record highs. Businesses now need threat intelligence to boost traditional cybersecurity defenses.

Roman Cuprik24 Mar 2026


Prevention first cybersecurity as a service
ESET Home Security