Latest Cybersecurity Articles

Family Safety Online

Raising confident YouTube kids: A parent´s safety guide for 2026

Raising confident YouTube kids: A parent´s safety guide for 2026

Family Safety Online

Raising confident YouTube kids: A parent´s safety guide for 2026

Help your child understand YouTube, set healthy boundaries, and guide them toward safe, confident viewing habits.

Roman Cuprik07 Jan 2026


Cybersecurity Protection

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Cybersecurity Protection

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Cybersecurity has always been an arms race between attackers and defenders. Now AI is set to supercharge that dynamic.

Phil Muncaster22 Dec 2025


Cybersecurity Protection

Is ChatGPT safe? The complete 2026 security & privacy guide

Is ChatGPT safe? The complete 2026 security & privacy guide

Cybersecurity Protection

Is ChatGPT safe? The complete 2026 security & privacy guide

OpenAI has invested heavily in enterprise-grade security, but even with strong safeguards, real risks remain.

Phil Muncaster18 Dec 2025


Threat landscape

Turbulence ahead: Cyber threats in aviation

Turbulence ahead: Cyber threats in aviation

Threat landscape

Turbulence ahead: Cyber threats in aviation

Aviation and aerospace can’t fly under cyber threat actors’ radars anymore.

Márk Szabó17 Dec 2025


What is

Understanding DDoS attacks: a comprehensive guide

Understanding DDoS attacks: a comprehensive guide

What is

Understanding DDoS attacks: a comprehensive guide

DDoS attacks are the loud side of cybercrime – designed to flood, crash, and cripple online services. Here’s what they are, how they work, and how you can stay protected.

Ben Tudor11 Dec 2025


Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

NOTE: The views and opinions expressed in this blogpost are those of ESET and do not necessarily reflect the views or positions of the MITRE Corporation.

Márk Szabó, James Shepperd, Ben Tudor10 Dec 2025


Cloud and Application Security

Keeping your business strong amidst Microsoft Partner Program and volume discount changes

Keeping your business strong amidst Microsoft Partner Program and volume discount changes

Cloud and Application Security

Keeping your business strong amidst Microsoft Partner Program and volume discount changes

If you’re a Microsoft business customer or a Microsoft Partner, you’ll be aware life is about to get more expensive.

Editorial Team09 Dec 2025


Prevention and Awareness

Clear for takeoff: Building cyber resilience in commercial aviation

Clear for takeoff: Building cyber resilience in commercial aviation

Prevention and Awareness

Clear for takeoff: Building cyber resilience in commercial aviation

Reminder: If someone asks for sensitive information without proper clearance, treat it like an unauthorized passenger — deny boarding immediately.

Márk Szabó07 Dec 2025


Family Safety Online

How to keep your child’s data safe and secure

How to keep your child’s data safe and secure

Family Safety Online

How to keep your child’s data safe and secure

Teach your child to protect their data, and explain the value of their online identity.

Roman Cuprik04 Dec 2025


Privacy and Identity Protection

Breaking down Telegram’s privacy promise: What’s protected and what’s not

Breaking down Telegram’s privacy promise: What’s protected and what’s not

Privacy and Identity Protection

Breaking down Telegram’s privacy promise: What’s protected and what’s not

Telegram may look like a secure messenger app, but when it comes to users at higher-risk and when there is confidential information involved, it has several serious security blind spots. This article breaks down how Telegram works, where its weak spots are, and which alternatives offer better security.

Editorial Team02 Dec 2025


Threat landscape

How to keep train security on track

How to keep train security on track

Threat landscape

How to keep train security on track

The arrival of threat actors on the railway scene may cause some lengthy delays and several late departures.

Márk Szabó01 Dec 2025


Device Protection

This shopping season will be different. Prepare for AI-powered scams targeting Android

This shopping season will be different. Prepare for AI-powered scams targeting Android

Device Protection

This shopping season will be different. Prepare for AI-powered scams targeting Android

Cybercriminals can utilize new AI-powered threats for Android before Christmas. Learn how to avoid them.

Roman Cuprik28 Nov 2025


Prevention first cybersecurity as a service
ESET Home Security