Latest Cybersecurity Articles

What is

How Social Engineering Attacks Work: Psychology, Tactics, and Real Examples

How Social Engineering Attacks Work: Psychology, Tactics, and Real Examples

What is

How Social Engineering Attacks Work: Psychology, Tactics, and Real Examples

Social engineering attacks are one of the most effective cybersecurity threats because they exploit human psychology instead of technical vulnerabilities.

Martin Sabol20 Jan 2026


Prevention and Awareness

Muddying the inbox: The hidden dangers of internal spearphishing

Muddying the inbox: The hidden dangers of internal spearphishing

Prevention and Awareness

Muddying the inbox: The hidden dangers of internal spearphishing

The latest ESET research sheds light on an advanced phishing technique that SOCs might find hard to catch.

Márk Szabó15 Jan 2026


What is

VPN vs. proxy: The definitive guide to digital security and privacy

VPN vs. proxy: The definitive guide to digital security and privacy

What is

VPN vs. proxy: The definitive guide to digital security and privacy

Using the internet today is fraught with risk. Rising cybercrime, invasive advertising, and government surveillance have made us more aware of security and privacy. While regulations like GDPR and CCPA aim to protect our rights, not all organizations play fair.

Phil Muncaster15 Jan 2026


Family Safety Online

Raising confident YouTube kids: A parent's safety guide for 2026

Raising confident YouTube kids: A parent's safety guide for 2026

Family Safety Online

Raising confident YouTube kids: A parent's safety guide for 2026

Help your child understand YouTube, set healthy boundaries, and guide them toward safe, confident viewing habits.

Roman Cuprik07 Jan 2026


Cybersecurity Protection

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Cybersecurity Protection

Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape

Cybersecurity has always been an arms race between attackers and defenders. Now AI is set to supercharge that dynamic.

Phil Muncaster22 Dec 2025


Cybersecurity Protection

Is ChatGPT safe? The complete 2026 security & privacy guide

Is ChatGPT safe? The complete 2026 security & privacy guide

Cybersecurity Protection

Is ChatGPT safe? The complete 2026 security & privacy guide

OpenAI has invested heavily in enterprise-grade security, but even with strong safeguards, real risks remain.

Phil Muncaster18 Dec 2025


Threat landscape

Turbulence ahead: Cyber threats in aviation

Turbulence ahead: Cyber threats in aviation

Threat landscape

Turbulence ahead: Cyber threats in aviation

Aviation and aerospace can’t fly under cyber threat actors’ radars anymore.

Márk Szabó17 Dec 2025


What is

Understanding DDoS attacks: a comprehensive guide

Understanding DDoS attacks: a comprehensive guide

What is

Understanding DDoS attacks: a comprehensive guide

DDoS attacks are the loud side of cybercrime – designed to flood, crash, and cripple online services. Here’s what they are, how they work, and how you can stay protected.

Ben Tudor11 Dec 2025


Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

Endpoint Security and XDR

Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026

NOTE: The views and opinions expressed in this blogpost are those of ESET and do not necessarily reflect the views or positions of the MITRE Corporation.

Márk Szabó, James Shepperd, Ben Tudor10 Dec 2025


Cloud and Application Security

Keeping your business strong amidst Microsoft Partner Program and volume discount changes

Keeping your business strong amidst Microsoft Partner Program and volume discount changes

Cloud and Application Security

Keeping your business strong amidst Microsoft Partner Program and volume discount changes

If you’re a Microsoft business customer or a Microsoft Partner, you’ll be aware life is about to get more expensive.

Editorial Team09 Dec 2025


Prevention and Awareness

Clear for takeoff: Building cyber resilience in commercial aviation

Clear for takeoff: Building cyber resilience in commercial aviation

Prevention and Awareness

Clear for takeoff: Building cyber resilience in commercial aviation

Reminder: If someone asks for sensitive information without proper clearance, treat it like an unauthorized passenger — deny boarding immediately.

Márk Szabó07 Dec 2025


Family Safety Online

How to keep your child’s data safe and secure

How to keep your child’s data safe and secure

Family Safety Online

How to keep your child’s data safe and secure

Teach your child to protect their data, and explain the value of their online identity.

Roman Cuprik04 Dec 2025


Prevention first cybersecurity as a service
ESET Home Security