WeLiveSecurity WeLiveSecurity
- Month in security with Tony Anscombe – October 2024 editionon October 31, 2024 at 2:29 pm
Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories
- How to remove your personal information from Google Search resultson October 30, 2024 at 10:00 am
Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.
- Don’t become a statistic: Tips to help keep your personal data off the dark webon October 29, 2024 at 10:00 am
You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it
- Tony Fadell: Innovating to save our planet | Starmus highlightson October 28, 2024 at 10:30 am
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts
- CloudScout: Evasive Panda scouting cloud serviceson October 28, 2024 at 10:00 am
ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services
- ESET Research Podcast: CosmicBeetleon October 24, 2024 at 9:00 am
Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world
- Embargo ransomware: Rock’n’Ruston October 23, 2024 at 9:00 am
Novice ransomware group Embargo is testing and deploying a new Rust-based toolkit
- Google Voice scams: What are they and how do I avoid them?on October 21, 2024 at 9:00 am
Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers
- Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombeon October 18, 2024 at 12:10 pm
The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year
- Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)on October 16, 2024 at 9:00 am
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship
- Quishing attacks are targeting electric car owners: Here’s how to slam on the brakeson October 15, 2024 at 9:00 am
Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details
- Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeshipson October 14, 2024 at 9:00 am
The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry
- GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombeon October 11, 2024 at 1:28 pm
ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities
- Telekopye transitions to targeting tourists via hotel booking scamon October 10, 2024 at 8:55 am
ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms
- Cyber insurance, human risk, and the potential for cyber-ratingson October 8, 2024 at 9:00 am
Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility?
- Mind the (air) gap: GoldenJackal gooses government guardrailson October 7, 2024 at 9:00 am
ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal
- The complexities of attack attribution – Week in security with Tony Anscombeon October 4, 2024 at 11:55 am
Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week
- Separating the bee from the panda: CeranaKeeper making a beeline for Thailandon October 2, 2024 at 1:00 pm
ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia
- Why system resilience should mainly be the job of the OS, not just third-party applicationson October 1, 2024 at 1:00 pm
Building efficient recovery options will drive ecosystem resilience
- Cybersecurity Awareness Month needs a radical overhaul – it needs legislationon October 1, 2024 at 9:00 am
Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices