Why the tech industry needs to stand firm on preserving end-to-end encryption
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Results driven. Results delivered.
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Here’s what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
Here’s a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities
Before rushing to prove that you’re not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
Behind every free online service, there’s a price being paid. Learn why your digital footprint is so valuable, and why you might be the product.
ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants
Cracking the code of a successful cybersecurity career starts here. Hear from ESET’s Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.