Losing your keys, your wallet β or anything else, really β can be a pain, but there is a wide world of trackers that can help you locate your missing things β with awesome accuracy
As we draw the curtain on another eventful year in cybersecurity, letβs review some of the high-profile cyber-incidents that befell various organizations this year
How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus other interesting findings from ESET's latest Threat Report
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn sour if the device and data on it arenβt secured properly
ESET researchers discuss the dynamics within and between various groups of scammers who use a Telegram bot called Telekopye to scam people on online marketplaces
A security compromise so stealthy that it doesnβt even require your interaction? Yes, zero-click attacks require no action from you β but this doesnβt mean youβre left vulnerable.
While it may be too late to introduce wholesale changes to your security policies, it doesnβt hurt to take a fresh look at where the biggest threats are and which best practices can help neutralize them
The holiday shopping season may be the time to splurge, but itβs a also favorite time of year for cybercriminals to target shoppers with phony deals, phishing scams and other threats
ESET's research team reveals details about the onboarding process of the Telekopye scam operation and the various methods that the fraudsters use to defraud people online
AI-driven voice cloning can make things far too easy for scammers β I know because Iβve tested it so that you donβt have to learn about the risks the hard way.
An attack against a port operator that ultimately hobbled some 40 percent of Australiaβs import and export capacity highlights the kinds of supply chain shocks that a successful cyberattack can cause
The Urdu version of the Hunza News website offers readers the option to download an Android app β little do they know that the app is actually spyware
By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk
Organizations that intend to tap into the potential of LLMs must also be able to manage the risks that could otherwise erode the technologyβs business value
Global Diversity Awareness Month is a timely occasion to reflect on the steps required to remove obstacles to women's participation in the security industry and to consider the value of diversity in the security workforce
Cybersecurity Awareness Month draws to a close and Halloween is just around the corner, so here is a bunch of spine-tingling figures about some very real tricks and threats lurking online
Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. Whatβs the trade-off?
ESET's analysis of cybercrime campaigns in Latin America reveals a notable shift from opportunistic crimeware to more complex threats, including those targeting enterprises and governments
Security researchers, global organizations, law enforcement and other government agencies need to have the right conversations and test potential scenarios without the pressure of an actual attack