Editorial Team

Editorial Team


Thoughtful pieces written by guest authors, including security experts and industry thought leaders.


144 articles by Editorial Team

Featured

Android threats: How have they evolved?

Android threats: How have they evolved?

Featured

Android threats: How have they evolved?

How has the number of Android attacks evolved in 2023? What types of Android threats are trending? Here’s a summary prepared in cooperation with Ondrej Kubovic, ESET Security Awareness Specialist.

Editorial Team28 Jun 20233 min. read


Featured

Log4Shell: Does this vulnerability still pose a risk?

Log4Shell: Does this vulnerability still pose a risk?

Featured

Log4Shell: Does this vulnerability still pose a risk?

Get to know Log4Shell, a vulnerability in Log4j, a popular open-source logging library, and keep your business safe from it.

Editorial Team28 Jun 20232 min. read


Featured

Ransomware as you (don’t) know it. What are the trends in 2023?

Ransomware as you (don’t) know it. What are the trends in 2023?

Featured

Ransomware as you (don’t) know it. What are the trends in 2023?

Ransomware has always been there and is always evolving. Nevertheless, massive ransomware attacks have appeared less frequently than in previous years as attackers shift to targeted attacks.

Editorial Team28 Jun 20234 min. read


Featured

8 types of apps that may endanger your data

8 types of apps that may endanger your data

Featured

8 types of apps that may endanger your data

Together with Daniel Chromek, Chief Information Security Officer at ESET, we discuss common ways people endanger their data through app services.

Editorial Team22 May 20237 min. read


Featured

Computer-generated boss: How do deepfakes work?

Computer-generated boss: How do deepfakes work?

Featured

Computer-generated boss: How do deepfakes work?

If your boss told you on Zoom to wire money, would you question if it’s really them? With deepfakes on the rise, maybe you should. This tech can entertain — but it can also deceive.

Editorial Team17 May 20235 min. read


Featured

Android malware detections grew by 57%. What else can you find in the latest ESET Threat Report?

Android malware detections grew by 57%. What else can you find in the latest ESET Threat Report?

Featured

Android malware detections grew by 57%. What else can you find in the latest ESET Threat Report?

The ESET Threat Report T3 2022 explains the impact of cryptocurrency exchange rates and soaring energy prices on various crypto-threats and the continuing influence of the war in Ukraine on the world of cybercrime.

Editorial Team28 Apr 20231 min. read


Threat landscape

Ransomware Security Tips for SMBs

Ransomware Security Tips for SMBs

Threat landscape

Ransomware Security Tips for SMBs

SMBs are increasingly becoming attractive targets for ransomware attacks. Why? Because these businesses accumulate more valuable data than individual consumers, and at the same time, they lack the robust security measures employed by large corporations or institutions.

Editorial Team26 Apr 20231 min. read


Featured

Managed detection and response (MDR): Is it suitable for your business?

Managed detection and response (MDR): Is it suitable for your business?

Featured

Managed detection and response (MDR): Is it suitable for your business?

XDR is making waves — using behavioral analytics to catch threats across your entire network. Don’t want to manage it yourself? That’s where MDR comes in: outsourced protection, smart and simple.

Editorial Team20 Apr 20234 min. read


Featured

Assessing your cyber-resilience: Why a cyber-risk audit makes you stronger

Assessing your cyber-resilience: Why a cyber-risk audit makes you stronger

Featured

Assessing your cyber-resilience: Why a cyber-risk audit makes you stronger

From phones to printers, digital devices power your business — but they also open doors to cyber threats. Regular cybersecurity risk audits help keep your defenses sharp.

Editorial Team12 Apr 20234 min. read