Latest Articles

Video

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

Video

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

A woman in London has been misidentified as a shoplifter by a facial recognition system, igniting fresh concerns over the technology's accuracy and reliability

Editor31 May 2024


We Live Progress

AI in HR: Is artificial intelligence changing how we hire employees forever?

AI in HR: Is artificial intelligence changing how we hire employees forever?

We Live Progress

AI in HR: Is artificial intelligence changing how we hire employees forever?

Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime?

Imogen Byers30 May 2024


Digital Security

ESET World 2024: Big on prevention, even bigger on AI

ESET World 2024: Big on prevention, even bigger on AI

Digital Security

ESET World 2024: Big on prevention, even bigger on AI

What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.

Márk Szabó29 May 2024


Digital Security

Beyond the buzz: Understanding AI and its role in cybersecurity

Beyond the buzz: Understanding AI and its role in cybersecurity

Digital Security

Beyond the buzz: Understanding AI and its role in cybersecurity

A new white paper from ESET uncovers the risks and opportunities of artificial intelligence for cyber-defenders

Phil Muncaster28 May 2024


Video

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

Video

Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe

As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?

Editor24 May 2024


ESET Research

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

ESET Research

Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries

Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings

Rene Holt23 May 2024


Digital Security

What happens when AI goes rogue (and how to stop it)

What happens when AI goes rogue (and how to stop it)

Digital Security

What happens when AI goes rogue (and how to stop it)

As AI gets closer to the ability to cause physical harm and impact the real world, “it’s complicated” is no longer a satisfying response

Cameron Camp22 May 2024


Business Security

Untangling the hiring dilemma: How security solutions free up HR processes

Untangling the hiring dilemma: How security solutions free up HR processes

Business Security

Untangling the hiring dilemma: How security solutions free up HR processes

The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum?

Márk Szabó21 May 2024


Video

The who, where, and how of APT attacks – Week in security with Tony Anscombe

The who, where, and how of APT attacks – Week in security with Tony Anscombe

Video

The who, where, and how of APT attacks – Week in security with Tony Anscombe

This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape

Editor17 May 2024


ESET Research

To the Moon and back(doors): Lunar landing in diplomatic missions

To the Moon and back(doors): Lunar landing in diplomatic missions

ESET Research

To the Moon and back(doors): Lunar landing in diplomatic missions

ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs

Filip Jurčacko15 May 2024


ESET Research

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain

ESET Research

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain

One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft

Marc-Etienne M.Léveillé14 May 2024


ESET Research, Threat Reports

ESET APT Activity Report Q4 2023–Q1 2024

ESET APT Activity Report Q4 2023–Q1 2024

ESET Research, Threat Reports

ESET APT Activity Report Q4 2023–Q1 2024

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024

Jean-Ian Boutin14 May 2024