WeLiveSecurity WeLiveSecurity
- Investors beware: AI-powered financial scams swamp social mediaon August 18, 2025 at 9:00 am
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
- Supply-chain dependencies: Check your resilience blind spoton August 12, 2025 at 2:08 pm
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
- How the always-on generation can level up its cybersecurity gameon August 12, 2025 at 9:00 am
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
- WinRAR zero-day exploited in espionage attacks against high-value targetson August 11, 2025 at 6:18 pm
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
- Update WinRAR tools now: RomCom and others exploiting zero-day vulnerabilityon August 11, 2025 at 9:00 am
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
- Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?on August 8, 2025 at 2:25 pm
A sky-high premium may not always reflect your company’s security posture
- Android adware: What is it, and how do I get it off my device?on August 8, 2025 at 9:00 am
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
- Black Hat USA 2025: Policy compliance and the myth of the silver bulleton August 7, 2025 at 4:03 pm
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
- Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?on August 7, 2025 at 2:23 pm
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
- ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatchon August 5, 2025 at 9:00 am
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
- Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)on August 1, 2025 at 12:08 pm
Here’s what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
- Why the tech industry needs to stand firm on preserving end-to-end encryptionon August 1, 2025 at 9:00 am
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
- This month in security with Tony Anscombe – July 2025 editionon July 31, 2025 at 7:43 am
Here’s a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
- The hidden risks of browser extensions – and how to stay safeon July 29, 2025 at 9:00 am
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
- SharePoint under fire: ToolShell attacks hit organizations worldwideon July 25, 2025 at 7:28 am
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
- ToolShell: An all-you-can-eat buffet for threat actorson July 24, 2025 at 9:00 am
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities
- Rogue CAPTCHAs: Look out for phony verification pages spreading malwareon July 24, 2025 at 8:30 am
Before rushing to prove that you’re not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
- Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4)on July 22, 2025 at 10:18 am
Behind every free online service, there’s a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product.
- Unmasking AsyncRAT: Navigating the labyrinth of forkson July 15, 2025 at 8:59 am
ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants
- How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)on July 4, 2025 at 9:40 am
Cracking the code of a successful cybersecurity career starts here. Hear from ESET’s Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.