ESET Threat Report H2 2025
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
20 articles
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
Identity is effectively the new network boundary. It must be protected at all costs.
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into tr...
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
Why your business needs the best-of-breed combination of technology and human expertise
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report