ESET Virtualization security solutions for business banner

White Papers

  • Ransomware: How to keep your business safe from extortion malware

    Ransomware is malware that can lock a device or encrypt its contents in order to extort money from the owner in return for restoring access to those resources. This kind of malware can also have a...

  • Windows Exploitation in 2015

    In our previous report "Windows exploitation in 2014", we mentioned a major trend in modern cyberattacks called 0day (or 0-day, or zero-day) attacks. This term refers to attacks that take advantage of...

  • Dissecting Linux/Moose

    Linux/Moose is a malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path. The compromised devices are used to steal ...

  • The State of Cybersecurity in Healthcare Organizations in 2016

    Healthcare organizations are in the cross hairs of cyber attackers as evidenced in the 2016 State of Cybersecurity in Healthcare Organizations Study sponsored by ESET. On average, healthcare...

  • Trends for 2015: Targeting the Corporate World

    The "Trends For 2015 – Targeting the Corporate World" report by the ESET LATAM Research Lab invites you to review some of the most significant cases that affected computer security in 2014, and to...

  • Malware is Called Malicious for a Reason: The Risks of Weaponizing Code

    In "Malware is Called Malicious for a Reason: The Risks of Weaponizing Code," Andrew Lee and Stephen Cobb review and assess the arguments for and against the use of malicious code for either active...