Latest Cybersecurity Articles

Device Protection

Old threats, novel tactics: Android users face new AI security challenges

Old threats, novel tactics: Android users face new AI security challenges

Device Protection

Old threats, novel tactics: Android users face new AI security challenges

ESET Research reveals how cybercriminals have improved their malicious campaigns.

Roman Cuprik02 Mar 2026


What is

What is ransomware, and how can you avoid falling victim to it?

What is ransomware, and how can you avoid falling victim to it?

What is

What is ransomware, and how can you avoid falling victim to it?

Understanding the nature of ransomware and how it has evolved from the early beginnings to becoming the prime cybersecurity threat to organizations and individuals is key to working out how to prevent or reduce the impact of a successful attack.

Ben Tudor27 Feb 2026


What is

What is antivirus software, how does it work, and why does it still matter?

What is antivirus software, how does it work, and why does it still matter?

What is

What is antivirus software, how does it work, and why does it still matter?

Learn what antivirus software is, how modern antivirus works, what threats it blocks, and why it still matters.

Phil Muncaster24 Feb 2026


Device Protection

Why Internet of Things (IoT) devices remain easy targets for hackers

Why Internet of Things (IoT) devices remain easy targets for hackers

Device Protection

Why Internet of Things (IoT) devices remain easy targets for hackers

Is IoT adoption a double-edged sword? Discover why our homes and businesses are paradoxically becoming less secure with the rise of connected devices.

Márk Szabó23 Feb 2026


Privacy and Identity Protection

Docusign phishing emails: How to spot and stop attacks before it’s too late

Docusign phishing emails: How to spot and stop attacks before it’s too late

Privacy and Identity Protection

Docusign phishing emails: How to spot and stop attacks before it’s too late

Docusign attacks are growing more sophisticated. Small businesses should strengthen their defenses through advanced cybersecurity and awareness training.

Phil Muncaster17 Feb 2026


Threat landscape

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Threat landscape

Building Digital Trust is a cornerstone at ESET and a lynchpin for humanity’s benefiting from Artificial Intelligence

Good cyber security is a foundational pillar of the new AI era, and to ensure it, we must have digital trust.

James Shepperd and Ben Tudor13 Feb 2026


Privacy and Identity Protection

What is typosquatting, why does it matter, and how do I tackle it?

What is typosquatting, why does it matter, and how do I tackle it?

Privacy and Identity Protection

What is typosquatting, why does it matter, and how do I tackle it?

Typosquatting attacks abuse look-alike domains and user typos to steal credentials, spread malware and hijack traffic. Learn how modern typosquatting works in 2026, the main attack types, and how users, security teams and brands can prevent it.

Phil Muncaster12 Feb 2026


Compliance and Regulations

Buried in rules: How to stay ahead of compliance

Buried in rules: How to stay ahead of compliance

Compliance and Regulations

Buried in rules: How to stay ahead of compliance

There’s a duality to compliance, wherein it is both a growing burden, but also an excellent opportunity.

Márk Szabó09 Feb 2026


Endpoint Security and XDR

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

Endpoint Security and XDR

What does ESET’s recognition as a Customers’ Choice for Endpoint Protection Platforms by the 2026 Gartner® Peer Insights™ mean for end users?

Learn what this recognition means for organizations seeking reliable, scalable endpoint protection.

Márk Szabó and James Shepperd06 Feb 2026


Family Safety Online

Help young gamers dodge Fortnite’s risks

Help young gamers dodge Fortnite’s risks

Family Safety Online

Help young gamers dodge Fortnite’s risks

Fortnite is more than just a popular game. It’s a social space where children play, communicate, and form habits that reach beyond the screen. What are its main risks, and how can parents help kids have a safer experience?

Roman Cuprik05 Feb 2026


What is

The most common scams small businesses should be aware of

The most common scams small businesses should be aware of

What is

The most common scams small businesses should be aware of

Scams get more sophisticated, and everyone is a target.

Roman Cuprik30 Jan 2026


What is

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

What is

Keyloggers defined: What to look for, how they affect you, and how to detect and defeat them

Sneaky tools that monitor your keystrokes have been around for decades. But what are keyloggers, how do they work, and how can you find and block them?

Ben Tudor29 Jan 2026


Prevention first cybersecurity as a service
ESET Home Security