ESET Resource center

Your reliable source of educative and enriching digital content

Featured resources

PREMIUM CONTENT

WHITEPAPER


A BUYER’S GUIDE TO MANAGED DETECTION AND RESPONSE: What is it and why do you need it?

Enter the realm of MDR, managed detection and response – a type of managed security service that combines tools, technologies, and cybersecurity experts.

REPORTS


Ransomware: A look at the criminal art of malicious code, pressure, and manipulation

Let's explore how ransomware as a form of cyber-extortion has become a major problem, what kinds of techniques ransomware gangs use.

REPORTS


Digital Sovereignty is only Possible with Strong IT Security

Being compliant with the latest standards and best practices in the field of digital sovereingty is a must when it comes to strong IT security.

CUSTOMER STORIES


 Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

CUSTOMER STORIES


Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

CUSTOMER STORIES


Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PREMIUM CONTENT

WHITEPAPER


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PREMIUM CONTENT

WHITEPAPER


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PREMIUM CONTENT

WHITEPAPER


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PREMIUM CONTENT

PRODUCT OVERVIEW


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PRODUCT OVERVIEW


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PREMIUM CONTENT

PRODUCT OVERVIEW


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

REPORTS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PREMIUM CONTENT

REPORTS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

REPORTS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

HANDBOOKS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PREMIUM CONTENT

HANDBOOKS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

HANDBOOKS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PODCASTS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PODCASTS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

PODCASTS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

WEBINARS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

WEBINARS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

WEBINARS


LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

Eset researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans.

Research insights

WELIVESECURITY

ESET Research

Learn about the latest cyber threats as investigated and analyzed by ESET researchers and threat detection experts.

WELIVESECURITY

Ukraine Crisis

Explore how ESET can help organizations navigate the heightened cyber risk surrounding Russia’s war on Ukraine.

WELIVESECURITY

Ransomware

Join us as we closely monitor the latest developments on the ransomware scene, and benefit from ESET expertise.

WELIVESECURITY

Videos

Stay tuned for ESET’s weekly video updates from the cybersecurity world presented by our expert Tony Anscombe.

Ready for next step?

Enter the world of enterprise protection