Latest Articles

Prevention and Awareness

Shadow IT: The Good, the Bad, and the Unapproved

Shadow IT: The Good, the Bad, and the Unapproved

Prevention and Awareness

Shadow IT: The Good, the Bad, and the Unapproved

Shadow IT lurks to undermine company security right under the noses of its IT operatives.

Márk Szabó10 Sep 2025


Threat landscape

Server security: Don’t let a bad potato spoil the whole bag

Server security: Don’t let a bad potato spoil the whole bag

Threat landscape

Server security: Don’t let a bad potato spoil the whole bag

How small businesses can avoid opportunistic attacks on servers.

Roman Cuprik08 Sep 2025


Threat landscape

ESET researcher discovers the first known AI-written ransomware: I feel thrilled but cautious

ESET researcher discovers the first known AI-written ransomware: I feel thrilled but cautious

Threat landscape

ESET researcher discovers the first known AI-written ransomware: I feel thrilled but cautious

Ransomware will likely become more sophisticated, faster spreading, and harder to detect.

Roman Cuprik27 Aug 2025


Threat landscape

Hook, line, and sinker: What is spearphishing, and why does ESET Research keep tabs on it?

Hook, line, and sinker: What is spearphishing, and why does ESET Research keep tabs on it?

Threat landscape

Hook, line, and sinker: What is spearphishing, and why does ESET Research keep tabs on it?

Spearphishing is a specific type of phishing attack, demonstrating real know-how and striking its target with surgical precision.

Márk Szabó18 Aug 2025


Prevention and Awareness

Cyber awareness training: How to improve your cyber resilience with a few clicks

Cyber awareness training: How to improve your cyber resilience with a few clicks

Prevention and Awareness

Cyber awareness training: How to improve your cyber resilience with a few clicks

The human element is still a crucial component of business cyber defense.

Roman Cuprik12 Aug 2025


Threat landscape

When access becomes a risk: Cyber threats facing professional services

When access becomes a risk: Cyber threats facing professional services

Threat landscape

When access becomes a risk: Cyber threats facing professional services

Professional services ensure success for their clients, but what about their own livelihoods? Their access is their bane, as threat actors seek to leverage them as springboards to others.

Márk Szabó07 Aug 2025


Endpoint Security and XDR

Security: Businesses need more. ESET moves from Essential to Advanced

Security: Businesses need more. ESET moves from Essential to Advanced

Endpoint Security and XDR

Security: Businesses need more. ESET moves from Essential to Advanced

With the evolution of threats, the definition of essential security is changing, and advanced tools are needed.

Roman Cuprik14 Jul 2025


Endpoint Security and XDR

Is your server protection up to par?

Is your server protection up to par?

Endpoint Security and XDR

Is your server protection up to par?

Security for local servers remains a critical aspect of an organization’s overall cybersecurity strategy.

Márk Szabó10 Jul 2025


Identity and Data Protection

Debunking five myths about business encryption

Debunking five myths about business encryption

Identity and Data Protection

Debunking five myths about business encryption

Let’s set the record straight and see why encryption is the cornerstone of company security.

Márk Szabó09 Jul 2025


Prevention first cybersecurity as a service
ESET Resource Center for Business
Your reliable source of educative and enriching digital content