Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.

Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.

A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation

ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions

A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found

Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims