WeLiveSecurity WeLiveSecurity
- Gamaredon X Turla collabon September 19, 2025 at 8:55 am
Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
- Small businesses, big targets: Protecting your business against ransomwareon September 18, 2025 at 9:00 am
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
- HybridPetya: The Petya/NotPetya copycat comes with a twiston September 16, 2025 at 11:33 am
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
- Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypasson September 12, 2025 at 9:00 am
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal
- Are cybercriminals hacking your systems – or just logging in?on September 11, 2025 at 8:55 am
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight
- Preventing business disruption and building cyber-resilience with MDRon September 9, 2025 at 9:00 am
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
- Under lock and key: Safeguarding business data with encryptionon September 5, 2025 at 8:53 am
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
- GhostRedirector poisons Windows servers: Backdoors with a side of Potatoeson September 4, 2025 at 8:55 am
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
- This month in security with Tony Anscombe – August 2025 editionon August 28, 2025 at 9:00 am
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
- Don’t let “back to school” become “back to (cyber)bullying”on August 27, 2025 at 9:00 am
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
- First known AI-powered ransomware uncovered by ESET Researchon August 26, 2025 at 11:12 pm
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
- “What happens online stays online” and other cyberbullying myths, debunkedon August 21, 2025 at 9:00 am
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
- The need for speed: Why organizations are turning to rapid, trustworthy MDRon August 19, 2025 at 9:00 am
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
- Investors beware: AI-powered financial scams swamp social mediaon August 18, 2025 at 9:00 am
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
- Supply-chain dependencies: Check your resilience blind spoton August 12, 2025 at 2:08 pm
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
- How the always-on generation can level up its cybersecurity gameon August 12, 2025 at 9:00 am
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
- WinRAR zero-day exploited in espionage attacks against high-value targetson August 11, 2025 at 6:18 pm
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
- Update WinRAR tools now: RomCom and others exploiting zero-day vulnerabilityon August 11, 2025 at 9:00 am
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
- Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?on August 8, 2025 at 2:25 pm
A sky-high premium may not always reflect your company’s security posture
- Android adware: What is it, and how do I get it off my device?on August 8, 2025 at 9:00 am
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
- Black Hat USA 2025: Policy compliance and the myth of the silver bulleton August 7, 2025 at 4:03 pm
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
- Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?on August 7, 2025 at 2:23 pm
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
- ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatchon August 5, 2025 at 9:00 am
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
- Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)on August 1, 2025 at 12:08 pm
Here’s what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
- Why the tech industry needs to stand firm on preserving end-to-end encryptionon August 1, 2025 at 9:00 am
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
- This month in security with Tony Anscombe – July 2025 editionon July 31, 2025 at 7:43 am
Here’s a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
- The hidden risks of browser extensions – and how to stay safeon July 29, 2025 at 9:00 am
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
- SharePoint under fire: ToolShell attacks hit organizations worldwideon July 25, 2025 at 7:28 am
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
- ToolShell: An all-you-can-eat buffet for threat actorson July 24, 2025 at 9:00 am
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities
- Rogue CAPTCHAs: Look out for phony verification pages spreading malwareon July 24, 2025 at 8:30 am
Before rushing to prove that you’re not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware