WeLiveSecurity WeLiveSecurity
- Phishing, privileges and passwords: Why identity is critical to improving cybersecurity postureon December 4, 2025 at 10:00 am
Identity is effectively the new network boundary. It must be protected at all costs.
- MuddyWater: Snakes by the riverbankon December 2, 2025 at 10:00 am
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook
- Oversharing is not caring: What’s at stake if your employees post too much onlineon December 1, 2025 at 10:00 am
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
- This month in security with Tony Anscombe – November 2025 editionon November 28, 2025 at 1:46 pm
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month’s cybersecurity news
- What parents should know to protect their children from doxxingon November 27, 2025 at 10:00 am
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.
- Influencers in the crosshairs: How cybercriminals are targeting content creatorson November 25, 2025 at 10:00 am
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
- MDR is the answer – now, what’s the question?on November 24, 2025 at 10:00 am
Why your business needs the best-of-breed combination of technology and human expertise
- The OSINT advantage: Find your weak spots before attackers doon November 20, 2025 at 10:00 am
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
- PlushDaemon compromises network devices for adversary-in-the-middle attackson November 19, 2025 at 9:55 am
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
- What if your romantic AI chatbot can’t keep a secret?on November 17, 2025 at 10:00 am
Does your chatbot know too much? Here’s why you should think twice before you tell your AI companion everything.
- How password managers can be hacked – and how to stay safeon November 13, 2025 at 10:00 am
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
- Why shadow AI could be your biggest security blind spoton November 11, 2025 at 10:00 am
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
- In memoriam: David Harleyon November 7, 2025 at 1:46 pm
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
- The who, where, and how of APT attacks in Q2 2025–Q3 2025on November 7, 2025 at 12:34 pm
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
- ESET APT Activity Report Q2 2025–Q3 2025on November 6, 2025 at 9:45 am
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
- Sharing is scaring: The WhatsApp scam you didn’t see comingon November 5, 2025 at 10:00 am
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
- How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)on November 4, 2025 at 10:00 am
Think you could never fall for an online scam? Think again. Here’s how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead
- Ground zero: 5 things to do after discovering a cyberattackon November 3, 2025 at 10:00 am
When every minute counts, preparation and precision can mean the difference between disruption and disaster
- This month in security with Tony Anscombe – October 2025 editionon October 31, 2025 at 10:00 am
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October’s headlines offer a glimpse of what’s shaping cybersecurity right now
- Fraud prevention: How to help older family members avoid scamson October 30, 2025 at 10:00 am
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically





