Rene Holt

Rene Holt

Security Awareness Specialist


Education: Master of Arts in Philosophy, Bachelor of Computing Science (in progress).

Position and history at ESET:I joined ESET’s Global Public Relations team in 2019.

What type of malware do you hate the most? The one I don’t know is there.

Favorite activities: Rebuilding motorcycle engines and tinkering with the electronics of my motorized velocipede.

What is your golden rule for cyperspace? Pause and think before you click on any link.

When did you get your first computer and what kind was it? I remember my family proudly buying a Pentium in the late 90’s.

Favorite computer game/activity: Playing with my Raspberry Pi 4.


23 articles by Rene Holt

Prevention and Awareness

Traveling your Zero Trust journey with ESET

Traveling your Zero Trust journey with ESET

Prevention and Awareness

Traveling your Zero Trust journey with ESET

Zero Trust seeks to transform how we secure business processes but not to the detriment of people

Rene Holt04 May 20234 min. read


Endpoint Security and XDR

Detection and response means becoming an active defender

Detection and response means becoming an active defender

Endpoint Security and XDR

Detection and response means becoming an active defender

Operating a detection and response console demands that IT admins adopt an active role in responding to threats.

Rene Holt16 Mar 20238 min. read


Endpoint Security and XDR

A Microsoft Exchange saga: How is ESET Technology protecting business customers post-exploitation?

A Microsoft Exchange saga: How is ESET Technology protecting business customers post-exploitation?

Endpoint Security and XDR

A Microsoft Exchange saga: How is ESET Technology protecting business customers post-exploitation?

ESET security teams' findings suggest that ESET Enterprise Inspector deployed on exploited servers can cut investigation time by at least 80%.

Rene Holt22 Nov 20213 min. read


Endpoint Security and XDR

Endpoint detection and response: The path to security maturity starts with visibility

Endpoint detection and response: The path to security maturity starts with visibility

Endpoint Security and XDR

Endpoint detection and response: The path to security maturity starts with visibility

The Carbanak and FIN7 ATT&CK Evaluation speaks to the gamut of security practices that should be in place to protect against even the most common threats.

Rene Holt11 Jun 20218 min. read


Device Protection

Android banking trojan FluBot impersonates international logistics companies

Android banking trojan FluBot impersonates international logistics companies

Device Protection

Android banking trojan FluBot impersonates international logistics companies

Forewarned is forearmed, and the case of FluBot malware is no exception, as it is poised to spread further.

Rene Holt20 May 20215 min. read


Threat landscape

What does the recent Microsoft Exchange attack frenzy tell CISOs about their approach to security?

What does the recent Microsoft Exchange attack frenzy tell CISOs about their approach to security?

Threat landscape

What does the recent Microsoft Exchange attack frenzy tell CISOs about their approach to security?

Before ESET shone the light on a slew of APT groups exploiting vulnerabilities in Exchange servers around the world, a smaller number were using zero days in targeted attacks – leading CISOs to reconsider their security approach.

Rene Holt18 Mar 20214 min. read


Prevention and Awareness

What blockchain means for enterprises and how to keep it secure

What blockchain means for enterprises and how to keep it secure

Prevention and Awareness

What blockchain means for enterprises and how to keep it secure

Blockchain has created new economies based on cheaper and faster transaction record keeping. But can it survive the audit of cybersecurity folk?

Rene Holt16 Feb 20215 min. read


Threat landscape

Supercomputers: A powerful force for growing, and losing, money

Supercomputers: A powerful force for growing, and losing, money

Threat landscape

Supercomputers: A powerful force for growing, and losing, money

The spate of attacks against HPC systems in 2020 highlights a growing threat facing the financial services sector.

Rene Holt15 Feb 20215 min. read


Threat landscape

Financial technology companies – big money and data for targeted malware attacks

Financial technology companies – big money and data for targeted malware attacks

Threat landscape

Financial technology companies – big money and data for targeted malware attacks

A Q&A with security researcher Matías Porolli, who has been keeping tabs on the latest activity of Evilnum, a cybercriminal group targeting financial technology (FinTech) companies.

Rene Holt12 Feb 20215 min. read