News
The H1 2025 issue of the ESET Threat Report reviews the key trends and developments that shaped the threat landscape from ...
A deceptive fake error attack vector, ClickFix, surged by over 500%, becoming the second most common attack method after ...
Less understood than phishing, the social engineering technique that tricks users into pasting malicious commands into tools ...
ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and ...
Google Chrome users have now been warned to update their browser immediately to avoid being targeted by hackers.
BRATISLAVA, Slovakia, June 17, 2025 (GLOBE NEWSWIRE) -- ESET, a global leader in cybersecurity solutions, is proud to announce its recognition as the Customers’ Choice in the 2025 Gartner® Peer ...
This latest incident marks the fourth actively exploited zero-day vulnerability fixed in Chrome this year. It follows three ...
Dubai, UAE: ESET, a global leader in cybersecurity solutions, is proud to announce its recognition as a “Notable Provider” in Forrester’s recently released The Managed Detection and Response Services ...
Attackers can exploit two newly discovered local privilege escalation (LPE) vulnerabilities to gain root privileges on systems running major Linux distributions. The first flaw (tracked as CVE ...
5 MacOS-like Linux distros that can rescue your old Intel Mac before support ends When Apple drops support for your Intel Mac, these Linux distributions can give it a fresh lease on life.
The Russian state-sponsored threat group APT28 is using Signal chats to target government targets in Ukraine with two ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results