Threat Landscape


71 articles

Threat landscape

How to protect valuable aviation and aerospace IP and R&D

How to protect valuable aviation and aerospace IP and R&D

Threat landscape

How to protect valuable aviation and aerospace IP and R&D

You can’t soar when your secrets are leaking below.

Márk Szabó and James Shepperd31 Oct 2025


Compliance and Regulations, Threat landscape

Accounting for cybersecurity in the financial sector

Accounting for cybersecurity in the financial sector

Compliance and Regulations, Threat landscape

Accounting for cybersecurity in the financial sector

Tomorrow’s financial leaders will be defined not by their defenses, but by their ability to adapt and recover from cyber shocks.

Márk Szabó20 Oct 2025


Threat landscape

Cybersecurity: The missing gear in auto manufacturing?

Cybersecurity: The missing gear in auto manufacturing?

Threat landscape

Cybersecurity: The missing gear in auto manufacturing?

Vehicle and parts manufacturing strength means little if cyber threats can stall production.

Márk Szabó24 Sep 2025


Threat landscape

Server security: Don’t let a bad potato spoil the whole bag

Server security: Don’t let a bad potato spoil the whole bag

Threat landscape

Server security: Don’t let a bad potato spoil the whole bag

How small businesses can avoid opportunistic attacks on servers.

Roman Cuprik08 Sep 2025


Threat landscape

ESET researcher discovers the first known AI-written ransomware: I feel thrilled but cautious

ESET researcher discovers the first known AI-written ransomware: I feel thrilled but cautious

Threat landscape

ESET researcher discovers the first known AI-written ransomware: I feel thrilled but cautious

Ransomware will likely become more sophisticated, faster spreading, and harder to detect.

Roman Cuprik27 Aug 2025


Threat landscape

Hook, line, and sinker: What is spearphishing, and why does ESET Research keep tabs on it?

Hook, line, and sinker: What is spearphishing, and why does ESET Research keep tabs on it?

Threat landscape

Hook, line, and sinker: What is spearphishing, and why does ESET Research keep tabs on it?

Spearphishing is a specific type of phishing attack, demonstrating real know-how and striking its target with surgical precision.

Márk Szabó18 Aug 2025


Threat landscape

When access becomes a risk: Cyber threats facing professional services

When access becomes a risk: Cyber threats facing professional services

Threat landscape

When access becomes a risk: Cyber threats facing professional services

Professional services ensure success for their clients, but what about their own livelihoods? Their access is their bane, as threat actors seek to leverage them as springboards to others.

Márk Szabó07 Aug 2025


Threat landscape

Why genuine digital sovereignty requires European IT security

Why genuine digital sovereignty requires European IT security

Threat landscape

Why genuine digital sovereignty requires European IT security

As Europe is rocked by recent global developments, it should harness the talent of its capable citizens to secure Europe physically and digitally.

Márk Szabó and André Lameiras25 Jun 2025


Threat landscape

Webmail services are under a barrage of XSS attacks. What SMBs need to know

Webmail services are under a barrage of XSS attacks. What SMBs need to know

Threat landscape

Webmail services are under a barrage of XSS attacks. What SMBs need to know

XSS attacks are a prevalent threat but can be stopped at multiple stages, and businesses need only simple tools to do it.

Roman Cuprik20 Jun 2025