Latest Cybersecurity Articles

Endpoint Security and XDR

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

Endpoint Security and XDR

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

Learn what this recognition means for organizations seeking reliable, scalable endpoint protection.

Márk Szabó and James Shepperd06 Feb 2026


Family Safety Online

Help young gamers dodge Fortnite’s risks

Help young gamers dodge Fortnite’s risks

Family Safety Online

Help young gamers dodge Fortnite’s risks

Fortnite is more than just a popular game. It’s a social space where children play, communicate, and form habits that reach beyond the screen. What are its main risks, and how can parents help kids have a safer experience?

Roman Cuprik05 Feb 2026


What is

The most common scams small businesses should be aware of

The most common scams small businesses should be aware of

What is

The most common scams small businesses should be aware of

Scams get more sophisticated, and everyone is a target.

Roman Cuprik30 Jan 2026


What is

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

What is

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Sneaky tools that monitor your keystrokes have been around for decades. But what are keyloggers, how do they work, and how can you find and block them?

Ben Tudor29 Jan 2026


Threat landscape, Prevention and Awareness

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Threat landscape, Prevention and Awareness

Cybersecurity for renewable energy: Best practices to protect critical infrastructure

Developments around renewable energy are moving fast. How can the sector ensure that cybersecurity keeps up in face of destructive attacks?

Márk Szabó and James Shepperd27 Jan 2026


Prevention and Awareness

What if? Security through the eyes of an attacker

What if? Security through the eyes of an attacker

Prevention and Awareness

What if? Security through the eyes of an attacker

There’s a version of your company only attackers ever see. It’s time you met it.

Márk Szabó26 Jan 2026


What is

How social engineering attacks work: Psychology, tactics, and real examples

How social engineering attacks work: Psychology, tactics, and real examples

What is

How social engineering attacks work: Psychology, tactics, and real examples

Why cybersecurity is no longer just about code – it’s about psychology.

Ben Tudor20 Jan 2026


Prevention and Awareness

Muddying the inbox: The hidden dangers of internal spearphishing

Muddying the inbox: The hidden dangers of internal spearphishing

Prevention and Awareness

Muddying the inbox: The hidden dangers of internal spearphishing

The latest ESET research sheds light on an advanced phishing technique that SOCs might find hard to catch.

Márk Szabó15 Jan 2026


What is

VPN vs. proxy: The definitive guide to digital security and privacy

VPN vs. proxy: The definitive guide to digital security and privacy

What is

VPN vs. proxy: The definitive guide to digital security and privacy

Using the internet today is fraught with risk. Rising cybercrime, invasive advertising, and government surveillance have made us more aware of security and privacy. While regulations like GDPR and CCPA aim to protect our rights, not all organizations play fair.

Phil Muncaster15 Jan 2026


Family Safety Online

Raising confident YouTube kids: A parent's safety guide for 2026

Raising confident YouTube kids: A parent's safety guide for 2026

Family Safety Online

Raising confident YouTube kids: A parent's safety guide for 2026

Help your child understand YouTube, set healthy boundaries, and guide them toward safe, confident viewing habits.

Roman Cuprik07 Jan 2026


Cybersecurity Protection

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Cybersecurity Protection

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Cybersecurity has always been an arms race between attackers and defenders. Now AI is set to supercharge that dynamic.

Phil Muncaster22 Dec 2025


Cybersecurity Protection

Is ChatGPT safe? The complete 2026 security & privacy guide

Is ChatGPT safe? The complete 2026 security & privacy guide

Cybersecurity Protection

Is ChatGPT safe? The complete 2026 security & privacy guide

OpenAI has invested heavily in enterprise-grade security, but even with strong safeguards, real risks remain.

Phil Muncaster18 Dec 2025


Prevention first cybersecurity as a service
ESET Home Security