Cybersecurity survival tips for small businesses: 2022 edition

How can businesses that lack the resources and technological expertise of large organizations hold the line against cybercriminals? Running and growing a business is hard work even in good times, but times of crisis bring a fresh crop of challenges. And as our reliance on technology for so many aspects of our lives increases, so does the … More Cybersecurity survival tips for small businesses: 2022 edition

Women in tech: Unique insights from a lifelong pursuit of innovation

Leading Slovak computer scientist Mária Bieliková shares her experience working as a woman driving technological innovation and reflects on how to inspire the next generation of talent in tech. It’s no secret that women continue to be underrepresented in the ranks of technologists. Indeed, with the scales traditionally tipped towards men, we may not always realize that … More Women in tech: Unique insights from a lifelong pursuit of innovation

ESET Honoured by CRN with 5-Star Rating in 2022 Partner Program Guide

ESET has been recognized with a prestigious 5-star rating by CRN®, a brand of The Channel Company, in its 2022 Partner Program Guide. The 5-star rating highlights vendors that deliver the best of the best, going above and beyond in their partner programs to help push growth and positive change. For more than 30 years, … More ESET Honoured by CRN with 5-Star Rating in 2022 Partner Program Guide

Europe’s quest for energy independence and how cyber‑risks come into play

Soaring energy prices and increased geopolitical tensions bring a sharp focus on European energy security. It is generally understood that the world is deeply interconnected, especially when it comes to energy supplies and the global energy trade. Maintaining complex, but reliable business and nation-state relationships has been central to ensuring a smooth and sustained functioning … More Europe’s quest for energy independence and how cyber‑risks come into play

Under the hood of Wslink’s multilayered virtual machine

ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques. ESET researchers recently described Wslink, a unique and previously undocumented malicious loader that runs as a server and that features a virtual-machine-based obfuscator. There are no code, functionality or operational similarities … More Under the hood of Wslink’s multilayered virtual machine