WeLiveSecurity WeLiveSecurity
- Under lock and key: Safeguarding business data with encryptionon September 5, 2025 at 8:53 am
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
- GhostRedirector poisons Windows servers: Backdoors with a side of Potatoeson September 4, 2025 at 8:55 am
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
- This month in security with Tony Anscombe – August 2025 editionon August 28, 2025 at 9:00 am
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
- Don’t let “back to school” become “back to (cyber)bullying”on August 27, 2025 at 9:00 am
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
- First known AI-powered ransomware uncovered by ESET Researchon August 26, 2025 at 11:12 pm
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
- “What happens online stays online” and other cyberbullying myths, debunkedon August 21, 2025 at 9:00 am
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
- The need for speed: Why organizations are turning to rapid, trustworthy MDRon August 19, 2025 at 9:00 am
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
- Investors beware: AI-powered financial scams swamp social mediaon August 18, 2025 at 9:00 am
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
- Supply-chain dependencies: Check your resilience blind spoton August 12, 2025 at 2:08 pm
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
- How the always-on generation can level up its cybersecurity gameon August 12, 2025 at 9:00 am
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
- WinRAR zero-day exploited in espionage attacks against high-value targetson August 11, 2025 at 6:18 pm
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
- Update WinRAR tools now: RomCom and others exploiting zero-day vulnerabilityon August 11, 2025 at 9:00 am
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
- Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?on August 8, 2025 at 2:25 pm
A sky-high premium may not always reflect your company’s security posture
- Android adware: What is it, and how do I get it off my device?on August 8, 2025 at 9:00 am
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
- Black Hat USA 2025: Policy compliance and the myth of the silver bulleton August 7, 2025 at 4:03 pm
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
- Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?on August 7, 2025 at 2:23 pm
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
- ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatchon August 5, 2025 at 9:00 am
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
- Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)on August 1, 2025 at 12:08 pm
Here’s what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
- Why the tech industry needs to stand firm on preserving end-to-end encryptionon August 1, 2025 at 9:00 am
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
- This month in security with Tony Anscombe – July 2025 editionon July 31, 2025 at 7:43 am
Here’s a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025