Latest Cybersecurity Articles

Threat landscape

Too big to ignore? The security crisis brewing in AI agent platforms

Too big to ignore? The security crisis brewing in AI agent platforms

Threat landscape

Too big to ignore? The security crisis brewing in AI agent platforms

What we found after scanning 60 thousand skills for AI agents, and how to put guardrails in place.

ESET Research20 Mar 2026


Privacy and Identity Protection

Is it safe to buy from Shein?

Is it safe to buy from Shein?

Privacy and Identity Protection

Is it safe to buy from Shein?

Large e-commerce platforms and their databases are always popular targets for cybercriminals.

Ben Tudor17 Mar 2026


Prevention and Awareness

Strong enough to lead: Navigating resilience in IT Security

Strong enough to lead: Navigating resilience in IT Security

Prevention and Awareness

Strong enough to lead: Navigating resilience in IT Security

What is core-code for leadership in IT security? Investing in resilience and trust.

Viktória Ivanová16 Mar 2026


Prevention and Awareness

You’ve got mail: How to secure your Microsoft Exchange server

You’ve got mail: How to secure your Microsoft Exchange server

Prevention and Awareness

You’ve got mail: How to secure your Microsoft Exchange server

Are email servers doomed to eternal vulnerability? International cybersecurity partners think otherwise.

Márk Szabó11 Mar 2026


Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

How to remove your personal information from the internet: A step-by-step guide

Privacy and Identity Protection

How to remove your personal information from the internet: A step-by-step guide

Your digital footprint reveals personal data that puts your security and privacy at risk. Here’s how to audit your exposure, remove PII, and stop it from resurfacing.

Phil Muncaster10 Mar 2026


Family Safety Online

Playing it safe: How to spot and fight cyberbullying in online games

Playing it safe: How to spot and fight cyberbullying in online games

Family Safety Online

Playing it safe: How to spot and fight cyberbullying in online games

Children have started gaming earlier than ever, some even before the age of five. How can you shield them from possible cyberbullies and keep the experience safe?

Roman Cuprik03 Mar 2026


Device Protection

Old threats, novel tactics: Android users face new AI security challenges

Old threats, novel tactics: Android users face new AI security challenges

Device Protection

Old threats, novel tactics: Android users face new AI security challenges

ESET Research reveals how cybercriminals have improved their malicious campaigns.

Roman Cuprik02 Mar 2026


What is

What is ransomware, and how can you avoid falling victim to it?

What is ransomware, and how can you avoid falling victim to it?

What is

What is ransomware, and how can you avoid falling victim to it?

Understanding the nature of ransomware and how it has evolved from the early beginnings to becoming the prime cybersecurity threat to organizations and individuals is key to working out how to prevent or reduce the impact of a successful attack.

Ben Tudor27 Feb 2026


What is

What is antivirus software, how does it work, and why does it still matter?

What is antivirus software, how does it work, and why does it still matter?

What is

What is antivirus software, how does it work, and why does it still matter?

Learn what antivirus software is, how modern antivirus works, what threats it blocks, and why it still matters.

Phil Muncaster24 Feb 2026


Device Protection

Why Internet of Things (IoT) devices remain easy targets for hackers

Why Internet of Things (IoT) devices remain easy targets for hackers

Device Protection

Why Internet of Things (IoT) devices remain easy targets for hackers

Is IoT adoption a double-edged sword? Discover why our homes and businesses are paradoxically becoming less secure with the rise of connected devices.

Márk Szabó23 Feb 2026


Privacy and Identity Protection

Docusign phishing emails: How to spot and stop attacks before it’s too late

Docusign phishing emails: How to spot and stop attacks before it’s too late

Privacy and Identity Protection

Docusign phishing emails: How to spot and stop attacks before it’s too late

Docusign attacks are growing more sophisticated. Small businesses should strengthen their defenses through advanced cybersecurity and awareness training.

Phil Muncaster17 Feb 2026


Threat landscape

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Threat landscape

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Good cyber security is a foundational pillar of the new AI era, and to ensure it, we must have digital trust.

James Shepperd and Ben Tudor13 Feb 2026


Prevention first cybersecurity as a service
ESET Home Security