Rene Holt

Rene Holt

Security Awareness Specialist


Education: Master of Arts in Philosophy, Bachelor of Computing Science (in progress).

Position and history at ESET:I joined ESET’s Global Public Relations team in 2019.

What type of malware do you hate the most? The one I don’t know is there.

Favorite activities: Rebuilding motorcycle engines and tinkering with the electronics of my motorized velocipede.

What is your golden rule for cyperspace? Pause and think before you click on any link.

When did you get your first computer and what kind was it? I remember my family proudly buying a Pentium in the late 90’s.

Favorite computer game/activity: Playing with my Raspberry Pi 4.


23 articles by Rene Holt

Threat landscape

Hacking and targeted cyber-attacks as a result of anti-competitive practices in business

Hacking and targeted cyber-attacks as a result of anti-competitive practices in business

Threat landscape

Hacking and targeted cyber-attacks as a result of anti-competitive practices in business

In ongoing consultations with clients, large companies named targeted attacks and hacking as two of their biggest security challenges since they can seriously impact business continuity.

Rene Holt19 Feb 20205 min. read


Threat landscape

Emotet trojan frustrated by ESET protection

Emotet trojan frustrated by ESET protection

Threat landscape

Emotet trojan frustrated by ESET protection

The Emotet trojan's developers have grown increasingly frustrated as they find themselves blocked by multilayered ESET solutions at every turn.

Rene Holt29 Jan 20204 min. read


Threat landscape

Advancing enterprise threat hunting with the MITRE ATT&CK™ knowledge base

Advancing enterprise threat hunting with the MITRE ATT&CK™ knowledge base

Threat landscape

Advancing enterprise threat hunting with the MITRE ATT&CK™ knowledge base

Taking advantage of the detections already written by ESET’s malware research team is a very effective way to bolster your SOC team’s capabilities.

Rene Holt22 Jan 20204 min. read


Identity and Data Protection

The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

Identity and Data Protection

The implications of control over internet infrastructure via DNS-over-HTTPS on privacy

DNS-over-HTTPS is likely to be more of a double-edged sword.

Rene Holt20 Jan 20203 min. read


Threat landscape

The Threat of Ransomware in the Public Sector

The Threat of Ransomware in the Public Sector

Threat landscape

The Threat of Ransomware in the Public Sector

Public entities face an increase in ransomware-related attacks, as threat actors continue to grow more sophisticated.

Rene Holt29 Oct 20183 min. read