Rene Holt

Rene Holt

Security Awareness Specialist


Education: Master of Arts in Philosophy, Bachelor of Computing Science (in progress).

Position and history at ESET:I joined ESET’s Global Public Relations team in 2019.

What type of malware do you hate the most? The one I don’t know is there.

Favorite activities: Rebuilding motorcycle engines and tinkering with the electronics of my motorized velocipede.

What is your golden rule for cyperspace? Pause and think before you click on any link.

When did you get your first computer and what kind was it? I remember my family proudly buying a Pentium in the late 90’s.

Favorite computer game/activity: Playing with my Raspberry Pi 4.


23 articles by Rene Holt

Endpoint Security and XDR

EDR spotlight: Countering the FireEye Red Team tools leak

EDR spotlight: Countering the FireEye Red Team tools leak

Endpoint Security and XDR

EDR spotlight: Countering the FireEye Red Team tools leak

ESET releases a 45-strong rule set for ESET Enterprise Inspector to detect the use of FireEye Red Team tools in customer networks

Rene Holt15 Dec 20204 min. read


Privacy and Identity Protection

The dangers to cryptocurrency wallets and how to fend them off - Part 2: Diverse threats to hot wallets and cold wallets

The dangers to cryptocurrency wallets and how to fend them off - Part 2: Diverse threats to hot wallets and cold wallets

Privacy and Identity Protection

The dangers to cryptocurrency wallets and how to fend them off - Part 2: Diverse threats to hot wallets and cold wallets

Homoglyph attacks, where malicious links mimic legitimate ones, pose a significant threat to cryptocurrency users. These deceptive links can lead to phishing sites, putting your digital assets at risk. Learn more about the dangers of bad links, the importance of robust security solutions, and discover practical advice for both hot and cold wallet users to safeguard their cryptocurrency.

Rene Holt30 Nov 20204 min. read


Privacy and Identity Protection

The dangers to cryptocurrency wallets and how to fend them off - Part 1: Hot wallets as part of computer ecosystems

The dangers to cryptocurrency wallets and how to fend them off - Part 1: Hot wallets as part of computer ecosystems

Privacy and Identity Protection

The dangers to cryptocurrency wallets and how to fend them off - Part 1: Hot wallets as part of computer ecosystems

Making a little effort to understand the most common threats when choosing and handling your cryptocurrency wallet can help secure your crypto-assets in the long run.

Rene Holt30 Nov 20205 min. read


Cybersecurity Protection

Emotet botnet hits quiet patch before Black Friday – the calm before the storm?

Emotet botnet hits quiet patch before Black Friday – the calm before the storm?

Cybersecurity Protection

Emotet botnet hits quiet patch before Black Friday – the calm before the storm?

Most wanted botnets – Emotet, Trickbot and Qbot. What are these bad amigos up to, and how do you stay safe?

Rene Holt27 Nov 20203 min. read


Privacy and Identity Protection

E-trading for a security-conscious beginner

E-trading for a security-conscious beginner

Privacy and Identity Protection

E-trading for a security-conscious beginner

Channeling your money into a trading platform deserves closer scrutiny of security.

Rene Holt23 Nov 20205 min. read


Threat landscape

Protecting your finances in an age of botnets

Protecting your finances in an age of botnets

Threat landscape

Protecting your finances in an age of botnets

The disruption of the Trickbot botnet will slash the number of cyberattacks aiming to swipe financial data and deploy ransomware.

Rene Holt12 Oct 20205 min. read


Threat landscape

Novel malicious software discovered by ESET continues to grow the MITRE ATT&CK™ knowledge base

Novel malicious software discovered by ESET continues to grow the MITRE ATT&CK™ knowledge base

Threat landscape

Novel malicious software discovered by ESET continues to grow the MITRE ATT&CK™ knowledge base

ESET is one of the top referenced and engaged vendors directly involved in refinement and population of the MITRE ATT&CK knowledge base.

Rene Holt11 Aug 20203 min. read


Compliance and Regulations

From incident to resolution: Essential steps to survive a cyberattack

From incident to resolution: Essential steps to survive a cyberattack

Compliance and Regulations

From incident to resolution: Essential steps to survive a cyberattack

Handling computer security incidents with a 4-phase incident response plan can help build your CSIRT's confidence to bring your business back to normal operations after an attack.

Rene Holt23 Jul 20207 min. read


Endpoint Security and XDR

The continued threat of nation-state attacks: Australia under the gun

The continued threat of nation-state attacks: Australia under the gun

Endpoint Security and XDR

The continued threat of nation-state attacks: Australia under the gun

No tool serves better than an endpoint detection and response tool like ESET Enterprise Inspector to gain comprehensive and immediate visibility into possibly compromised endpoints.

Rene Holt13 Jul 20203 min. read