WeLiveSecurity WeLiveSecurity
- Credential stuffing: What it is and how to protect yourselfon January 8, 2026 at 10:00 am
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts
- This month in security with Tony Anscombe – December 2025 editionon December 29, 2025 at 10:00 am
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year
- A brush with online fraud: What are brushing scams and how do I stay safe?on December 23, 2025 at 10:00 am
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
- Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Componenton December 22, 2025 at 9:55 am
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
- LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japanon December 18, 2025 at 10:00 am
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions
- ESET Threat Report H2 2025on December 16, 2025 at 9:50 am
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
- Black Hat Europe 2025: Was that device designed to be on the internet at all?on December 12, 2025 at 3:22 pm
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
- Black Hat Europe 2025: Reputation matters – even in the ransomware economyon December 11, 2025 at 4:04 pm
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims
- Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurityon December 11, 2025 at 10:00 am
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
- Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpieceon December 10, 2025 at 3:03 pm
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
- The big catch: How whaling attacks target top executiveson December 9, 2025 at 10:00 am
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
- Phishing, privileges and passwords: Why identity is critical to improving cybersecurity postureon December 4, 2025 at 10:00 am
Identity is effectively the new network boundary. It must be protected at all costs.
- MuddyWater: Snakes by the riverbankon December 2, 2025 at 10:00 am
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook
- Oversharing is not caring: What’s at stake if your employees post too much onlineon December 1, 2025 at 10:00 am
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
- This month in security with Tony Anscombe – November 2025 editionon November 28, 2025 at 1:46 pm
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month’s cybersecurity news
- What parents should know to protect their children from doxxingon November 27, 2025 at 10:00 am
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.
- Influencers in the crosshairs: How cybercriminals are targeting content creatorson November 25, 2025 at 10:00 am
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
- MDR is the answer – now, what’s the question?on November 24, 2025 at 10:00 am
Why your business needs the best-of-breed combination of technology and human expertise
- The OSINT advantage: Find your weak spots before attackers doon November 20, 2025 at 10:00 am
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
- PlushDaemon compromises network devices for adversary-in-the-middle attackson November 19, 2025 at 9:55 am
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
- What if your romantic AI chatbot can’t keep a secret?on November 17, 2025 at 10:00 am
Does your chatbot know too much? Here’s why you should think twice before you tell your AI companion everything.
- How password managers can be hacked – and how to stay safeon November 13, 2025 at 10:00 am
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
- Why shadow AI could be your biggest security blind spoton November 11, 2025 at 10:00 am
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
- In memoriam: David Harleyon November 7, 2025 at 1:46 pm
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
- The who, where, and how of APT attacks in Q2 2025–Q3 2025on November 7, 2025 at 12:34 pm
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
- ESET APT Activity Report Q2 2025–Q3 2025on November 6, 2025 at 9:45 am
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
- Sharing is scaring: The WhatsApp scam you didn’t see comingon November 5, 2025 at 10:00 am
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
- How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)on November 4, 2025 at 10:00 am
Think you could never fall for an online scam? Think again. Here’s how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead
- Ground zero: 5 things to do after discovering a cyberattackon November 3, 2025 at 10:00 am
When every minute counts, preparation and precision can mean the difference between disruption and disaster
- This month in security with Tony Anscombe – October 2025 editionon October 31, 2025 at 10:00 am
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October’s headlines offer a glimpse of what’s shaping cybersecurity right now





