Stay ahead of digital threats with insights from a cybersecurity leader
Roman Cuprik • 07 Jan 2026 • 10 min. read
Family Safety Online
Raising confident YouTube kids: A parent's safety guide for 2026
Phil Muncaster • 22 Dec 2025 • 10 min. read
Cybersecurity Protection
Five ways AI is changing cyber-attacks: deepfakes, smishing and the new threat landscape
Phil Muncaster • 18 Dec 2025 • 11 min. read
Is ChatGPT safe? The complete 2026 security & privacy guide
Prevention and Awareness
Muddying the inbox: The hidden dangers of internal spearphishing
Privacy and Identity Protection
What to do if your Facebook account is hacked
What is
How Social Engineering Attacks Work: Psychology, Tactics, and Real Examples
Social engineering attacks are one of the most effective cybersecurity threats because they exploit human psychology instead of technical vulnerabilities.
Martin Sabol • 20 Jan 2026
The latest ESET research sheds light on an advanced phishing technique that SOCs might find hard to catch.
Márk Szabó • 15 Jan 2026
VPN vs. proxy: The definitive guide to digital security and privacy
Using the internet today is fraught with risk. Rising cybercrime, invasive advertising, and government surveillance have made us more aware of security and privacy. While regulations like GDPR and CCPA aim to protect our rights, not all organizations play fair.
Phil Muncaster • 15 Jan 2026
Help your child understand YouTube, set healthy boundaries, and guide them toward safe, confident viewing habits.
Roman Cuprik • 07 Jan 2026
Cybersecurity has always been an arms race between attackers and defenders. Now AI is set to supercharge that dynamic.
Phil Muncaster • 22 Dec 2025
OpenAI has invested heavily in enterprise-grade security, but even with strong safeguards, real risks remain.
Phil Muncaster • 18 Dec 2025
Threat landscape
Turbulence ahead: Cyber threats in aviation
Aviation and aerospace can’t fly under cyber threat actors’ radars anymore.
Márk Szabó • 17 Dec 2025
Understanding DDoS attacks: a comprehensive guide
DDoS attacks are the loud side of cybercrime – designed to flood, crash, and cripple online services. Here’s what they are, how they work, and how you can stay protected.
Ben Tudor • 11 Dec 2025
Endpoint Security and XDR
Bypass the participant hype, and the MITRE ATT&CK® Evaluations Enterprise 2025 will tell you what effective security should look like in 2026
NOTE: The views and opinions expressed in this blogpost are those of ESET and do not necessarily reflect the views or positions of the MITRE Corporation.
Márk Szabó, James Shepperd, Ben Tudor • 10 Dec 2025
Cloud and Application Security
Keeping your business strong amidst Microsoft Partner Program and volume discount changes
If you’re a Microsoft business customer or a Microsoft Partner, you’ll be aware life is about to get more expensive.
Editorial Team • 09 Dec 2025
Clear for takeoff: Building cyber resilience in commercial aviation
Reminder: If someone asks for sensitive information without proper clearance, treat it like an unauthorized passenger — deny boarding immediately.
Márk Szabó • 07 Dec 2025
How to keep your child’s data safe and secure
Teach your child to protect their data, and explain the value of their online identity.
Roman Cuprik • 04 Dec 2025
Sign up for our newsletters
Thank you! Please check your email and confirm your subscription.