NEWSROOM

News Highlights
Comprehensive collection of ESET News, including the highest performing press releases, research, and thought leadership content gathered on single page.Level Up with B1G2 Technologies at the Philippine Tech Show 2026
B1G2 Technologies is gearing up for our booth at the Philippines’ premier technology trade show, the Philippine Tech Show 2026. Hosted by the Philippine Cable and Telecommunications Association (PCTA), this event brings together industry leaders, innovators, tech enthusiasts, and decision-makers from across the Philippines and beyond.
Invisible vs. Visible Watermarking: What Suits Your Organization?
The article emphasizes the importance of watermarking in preventing data leaks that occur even after legitimate access is granted. It discusses both visible and invisible watermarking, detailing their unique advantages and use cases. By combining these methods, organizations can enhance accountability and traceability for sensitive information, addressing risks effectively during exposure.
OpenClaw: your personal AI assistant – and your personal risk
AI technology is advancing towards automation with agents like OpenClaw that execute tasks independently on users’ computers. This capability poses risks, especially if an attacker gains control, leading to unauthorized actions. Users must be cautious with permissions to prevent exploitation. Controlled use of AI agents is essential for safety.
Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs. What do M&S and Co-op Group have in common? Aside from...
Is your LinkedIn profile revealing too much?
The article emphasizes the risks of sharing personal information on LinkedIn, including phone numbers and email addresses, which can be exploited by cybercriminals using web scraping techniques. It advises users to configure privacy settings, limit shared information, and verify connection requests to mitigate potential data breaches and identity theft.
Debunking five myths about business encryption
Encryption is essential for business security, serving to protect sensitive data and meeting regulatory requirements. Despite common myths about its complexity, cost, and redundancy, encryption significantly enhances security against cyber threats. Its various types, including symmetric and asymmetric encryption, have practical applications across different business contexts, making it indispensable in today’s digital landscape.






