WeLiveSecurity WeLiveSecurity
- Credential stuffing: What it is and how to protect yourselfon January 8, 2026 at 10:00 am
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts
- This month in security with Tony Anscombe – December 2025 editionon December 29, 2025 at 10:00 am
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year
- A brush with online fraud: What are brushing scams and how do I stay safe?on December 23, 2025 at 10:00 am
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
- Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Componenton December 22, 2025 at 9:55 am
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
- LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japanon December 18, 2025 at 10:00 am
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions
- ESET Threat Report H2 2025on December 16, 2025 at 9:50 am
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
- Black Hat Europe 2025: Was that device designed to be on the internet at all?on December 12, 2025 at 3:22 pm
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
- Black Hat Europe 2025: Reputation matters – even in the ransomware economyon December 11, 2025 at 4:04 pm
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims
- Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurityon December 11, 2025 at 10:00 am
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
- Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpieceon December 10, 2025 at 3:03 pm
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
- The big catch: How whaling attacks target top executiveson December 9, 2025 at 10:00 am
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
- Phishing, privileges and passwords: Why identity is critical to improving cybersecurity postureon December 4, 2025 at 10:00 am
Identity is effectively the new network boundary. It must be protected at all costs.
- MuddyWater: Snakes by the riverbankon December 2, 2025 at 10:00 am
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook
- Oversharing is not caring: What’s at stake if your employees post too much onlineon December 1, 2025 at 10:00 am
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
- This month in security with Tony Anscombe – November 2025 editionon November 28, 2025 at 1:46 pm
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month’s cybersecurity news
- What parents should know to protect their children from doxxingon November 27, 2025 at 10:00 am
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.
- Influencers in the crosshairs: How cybercriminals are targeting content creatorson November 25, 2025 at 10:00 am
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
- MDR is the answer – now, what’s the question?on November 24, 2025 at 10:00 am
Why your business needs the best-of-breed combination of technology and human expertise
- The OSINT advantage: Find your weak spots before attackers doon November 20, 2025 at 10:00 am
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
- PlushDaemon compromises network devices for adversary-in-the-middle attackson November 19, 2025 at 9:55 am
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks




