278 articles

Threat landscape

Protecting your finances in an age of botnets

Protecting your finances in an age of botnets

Threat landscape

Protecting your finances in an age of botnets

The disruption of the Trickbot botnet will slash the number of cyberattacks aiming to swipe financial data and deploy ransomware.

Rene Holt12 Oct 2020


Threat landscape

Novel malicious software discovered by ESET continues to grow the MITRE ATT&CK™ knowledge base

Novel malicious software discovered by ESET continues to grow the MITRE ATT&CK™ knowledge base

Threat landscape

Novel malicious software discovered by ESET continues to grow the MITRE ATT&CK™ knowledge base

ESET is one of the top referenced and engaged vendors directly involved in refinement and population of the MITRE ATT&CK knowledge base.

Rene Holt11 Aug 2020


Identity and Data Protection

A hacker stole my life. And I got it back.

A hacker stole my life. And I got it back.

Identity and Data Protection

A hacker stole my life. And I got it back.

Follow the story of Xander Koppelmans as he tells the tale of his company's struggles, including a cyberattack that costed him almost everything.

Editorial Team11 Aug 2020


Endpoint Security and XDR

How to create a secure and productive remote office

How to create a secure and productive remote office

Endpoint Security and XDR

How to create a secure and productive remote office

When a crisis hits, be ready to switch to teleworking. That is just one of the lessons COVID-19 has taught companies all around the world. Remote working should go hand in hand with extra cybersecurity measures – here’s how to achieve them.

Editorial Team10 Aug 2020


Identity and Data Protection

Why are encryption and MFA essential for your business?

Why are encryption and MFA essential for your business?

Identity and Data Protection

Why are encryption and MFA essential for your business?

If you want to avoid data breaches, use two-factor authentication and encryption on all devices.

Editorial Team07 Aug 2020


Endpoint Security and XDR

Cyberattacks on videoconferencing platforms: A new trend that escalated quickly

Cyberattacks on videoconferencing platforms: A new trend that escalated quickly

Endpoint Security and XDR

Cyberattacks on videoconferencing platforms: A new trend that escalated quickly

The COVID-19 lockdowns forced millions of people to work from home. With skyrocketing numbers of users, video meeting programs like Zoom almost immediately became the target of hackers.

Editorial Team30 Jul 2020


Compliance and Regulations

From incident to resolution: Essential steps to survive a cyberattack

From incident to resolution: Essential steps to survive a cyberattack

Compliance and Regulations

From incident to resolution: Essential steps to survive a cyberattack

Handling computer security incidents with a 4-phase incident response plan can help build your CSIRT's confidence to bring your business back to normal operations after an attack.

Rene Holt23 Jul 2020


Endpoint Security and XDR

The continued threat of nation-state attacks: Australia under the gun

The continued threat of nation-state attacks: Australia under the gun

Endpoint Security and XDR

The continued threat of nation-state attacks: Australia under the gun

No tool serves better than an endpoint detection and response tool like ESET Enterprise Inspector to gain comprehensive and immediate visibility into possibly compromised endpoints.

Rene Holt13 Jul 2020


Identity and Data Protection

Encryption as a must: How to find the right solution for your business

Encryption as a must: How to find the right solution for your business

Identity and Data Protection

Encryption as a must: How to find the right solution for your business

Have you tried to deploy an encryption product but failed? Don’t give up. Even one stolen phone can jeopardize your business.

Editorial Team05 Jun 2020