WeLiveSecurity WeLiveSecurity
- My information was stolen. Now what?on November 19, 2024 at 10:00 am
The slow and painful recovery process
- What is “Scam Likely”? Putting the phone down on unwanted callson November 18, 2024 at 10:00 am
Tired of dodging all those ‘Scam Likely’ calls? Here’s what’s behind the label and how to stay one step ahead of phone scammers.
- ESET APT Activity Report Q2 2024–Q3 2024: Key findingson November 14, 2024 at 4:16 pm
ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity Report
- ESET Research Podcast: Gamaredonon November 13, 2024 at 10:00 am
ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation
- Beats by bot: The AI remix revolutionon November 12, 2024 at 10:00 am
Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the future of music
- Beyond the checkbox: Demystifying cybersecurity complianceon November 11, 2024 at 10:00 am
In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business
- Life on a crooked RedLine: Analyzing the infamous infostealer’s backendon November 8, 2024 at 10:00 am
Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules
- ESET APT Activity Report Q2 2024–Q3 2024on November 7, 2024 at 9:55 am
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2024 and Q3 2024
- Jane Goodall: Reasons for hope | Starmus highlightson November 6, 2024 at 2:48 pm
The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity
- Month in security with Tony Anscombe – October 2024 editionon October 31, 2024 at 2:29 pm
Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories
- How to remove your personal information from Google Search resultson October 30, 2024 at 10:00 am
Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.
- Don’t become a statistic: Tips to help keep your personal data off the dark webon October 29, 2024 at 10:00 am
You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it
- Tony Fadell: Innovating to save our planet | Starmus highlightson October 28, 2024 at 10:30 am
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts
- CloudScout: Evasive Panda scouting cloud serviceson October 28, 2024 at 10:00 am
ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services
- ESET Research Podcast: CosmicBeetleon October 24, 2024 at 9:00 am
Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world
- Embargo ransomware: Rock’n’Ruston October 23, 2024 at 9:00 am
Novice ransomware group Embargo is testing and deploying a new Rust-based toolkit
- Google Voice scams: What are they and how do I avoid them?on October 21, 2024 at 9:00 am
Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers
- Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombeon October 18, 2024 at 12:10 pm
The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year
- Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)on October 16, 2024 at 9:00 am
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship
- Quishing attacks are targeting electric car owners: Here’s how to slam on the brakeson October 15, 2024 at 9:00 am
Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details