Global and UK Cyber Security News

Comprehensive collection of ESET News, including UK cyber security news, Press Releases, Blog Posts, Research, and Thought Leadership content.

Latest Security News

ESET is recognised as a Customers’ Choice for Midsize Enterprises in the 2024 Gartner® Peer Insights™ Voice of the Customer for Endpoint Protection Platforms Report

BRATISLAVA — 03 July, 2024 ESET, a global leader in cybersecurity solutions, has been named a Customers’ Choice among Midsize Enterprises in the 2024 Gartner® Peer Insights™ ´Voice of the Customer´…

ESET Research: Arid Viper group targets Middle East again, poisons Palestinian app with AridSpy spyware

  • ESET Research discovered multistage Android malware, which ESET named AridSpy, being distributed via five dedicated websites.
  • ESET detected occurrences of AridSpy in both Palestine and Egypt and…

ESET’s AI Advisor Module to Enhance Threat Detection and Response

Bratislava – May 29, 2024  ESET, a global leader in cybersecurity solutions, is proud to introduce the ESET AI Advisor, an innovative generative AI-based assistant designed to transform incident…

ESET partners with Bournemouth University to launch UK Women in Cyber Studentship

  • New studentship available to female Bournemouth University cyber students
  • £5,000 grant for three undergraduate students over the next three academic years

BOURNEMOUTH, UK – May 22, 2024 – Today,…


Corporate Blog

How To Protect Your Phone and Data Against Face Stealing Scams

Cybercriminals can now steal facial recognition data and use AI to create deepfakes for authentication. What does it mean for consumers and business?

Takes from Kaseya DattoCon: You have only one reputation

Opting for cheap cybersecurity solutions could prove more costly than you think.

Locked Shields 2024: Ancient inspiration deployed for today’s complex digital battlegrounds

Is it strange that cybersecurity companies would be called to share their expertise in a military simulation of today’s digital battlespace? The answer seems to be a resounding no.

However, despite…

Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks

C-level executives, diplomats, and high-ranking IT managers usually have access to sensitive information, huge amounts of data, finances, or a combination of all these things. And adversaries know it.


WeLiveSecurity

Understanding IoT security risks and how to mitigate them | Cybersecurity podcast

As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds?

5 common Ticketmaster scams: How fraudsters steal the show

Scammers gonna scam scam scam, so before hunting for your tickets to a Taylor Swift gig or other in-demand events, learn how to stop fraudsters from leaving a blank space in your bank account

Social media and teen mental health – Week in security with Tony Anscombe

Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick?

No room for error: Don’t get stung by these common Booking.com scams

From sending phishing emails to posting fake listings, here’s how fraudsters hunt for victims while you’re booking your well-earned vacation