Fixing trivial passwords is as easy as 123456
How come it’s still possible to ‘secure’ an online account with a six-digit string? 07 May 2026 • , 4 min. read The most-used password…
How come it’s still possible to ‘secure’ an online account with a six-digit string? 07 May 2026 • , 4 min. read The most-used password…
Warnings about helpdesk impersonation scams and Iran-linked hackers targeting critical sectors in the US, plus the most damaging scams of 2025 – here’s some of…
A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability 24 Apr 2026 • , 5 min. read…
ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions 23 Apr 2026 • , 6 min.…
ESET Research has discovered a new variant of the NGate malware family that abuses a legitimate Android application called HandyPay, instead of the previously leveraged…
ESET Research Threat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025…
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts 16…
In March 2024, an affiliate of the BlackCat ransomware gang took to a cybercrime forum with a complaint. They’d carried out the attack on Change…
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot. 17 Apr 2026 • …
Some cyber business risks only show up when you take a closer look. Supply chain blind spots are a perfect example. Behind these essential third-party…
If you’ve been the victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may…
Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy. 07 Apr 2026 • …