PlushDaemon compromises network devices for adversary-in-the-middle attacks
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
Results driven. Results delivered.
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
Does your chatbot know too much? Think twice before you tell your AI companion everything.
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
Think you could never fall for an online scam? Think again. Here’s how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms