News

The computer scientist and AI researcher Mária Bieliková shares her thoughts on the technologys potential and pitfalls – and what may lie ahead for us.
This issue of the ESET APT Activity Report reviews notable activities of APT group that were documented by ESET researchers from October 2024 until March 2025.
Once confined to research labs, generative AI is now available to anyone – including those with ill intentions, who use AI tools not to spark creativity, but to fuel deception instead.
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.
StrongPity espionage campaign targeting Android users. ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the ...
When Google enters a particular market, it often means bad news for the incumbents. So it was with Google Forms, the tech giant’s form and quiz-building tool that launched in 2008. According to ...
It was bound to happen – LLM tech gone rogue was bound to be brought to bear on innocent targets, after loitering along a grey area between good and evil, embodying the technological paradox ...
Chances are high that many people think, “it’s an iPhone, so I’m safe”. Apple’s control over its device and app ecosystem has indeed historically been tight, with its walled-garden ...
When was the last time you searched for something using Google Search, Bing or another gateway to the endless expanse of the internet? What a silly question, right? It may have been just moments ...
So your friend has been hacked: Could you be next? When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
They’re coming for your data: What are infostealers and how do I stay safe? Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest ...
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems. The campaign, which we attribute to GoldenJackal, a ...