Women in tech: Unique insights from a lifelong pursuit of innovation

Leading Slovak computer scientist Mária Bieliková shares her experience working as a woman driving technological innovation and reflects on how to inspire the next generation of talent in tech. It’s no secret that women continue to be underrepresented in the ranks of technologists. Indeed, with the scales traditionally tipped towards men, we may not always realize that … More Women in tech: Unique insights from a lifelong pursuit of innovation

ESET Honoured by CRN with 5-Star Rating in 2022 Partner Program Guide

ESET has been recognized with a prestigious 5-star rating by CRN®, a brand of The Channel Company, in its 2022 Partner Program Guide. The 5-star rating highlights vendors that deliver the best of the best, going above and beyond in their partner programs to help push growth and positive change. For more than 30 years, … More ESET Honoured by CRN with 5-Star Rating in 2022 Partner Program Guide

Europe’s quest for energy independence and how cyber‑risks come into play

Soaring energy prices and increased geopolitical tensions bring a sharp focus on European energy security. It is generally understood that the world is deeply interconnected, especially when it comes to energy supplies and the global energy trade. Maintaining complex, but reliable business and nation-state relationships has been central to ensuring a smooth and sustained functioning … More Europe’s quest for energy independence and how cyber‑risks come into play

Under the hood of Wslink’s multilayered virtual machine

ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques. ESET researchers recently described Wslink, a unique and previously undocumented malicious loader that runs as a server and that features a virtual-machine-based obfuscator. There are no code, functionality or operational similarities … More Under the hood of Wslink’s multilayered virtual machine

ESET Research discovers scheme to steal cryptocurrency from Android and iPhone users

The attackers distributed malicious apps via fake and legitimate sites, and Telegram and Facebook groups. This sophisticated malicious cryptocurrency scheme targets mobile devices using Android or iOS operating systems (iPhones). The malicious apps were distributed through fake websites, mimicking legitimate wallet services and promoted with ads placed on legitimate sites using misleading articles, and via … More ESET Research discovers scheme to steal cryptocurrency from Android and iPhone users