WeLiveSecurity WeLiveSecurity
- Cloud workload security: Mind the gapson March 24, 2026 at 10:00 am
As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning
- Move fast and save things: A quick guide to recovering a hacked accounton March 20, 2026 at 10:00 am
What you do – and how fast – after an account is compromised often matters more than it may seem
- EDR killers explained: Beyond the driverson March 19, 2026 at 9:55 am
ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers
- Face value: What it takes to fool facial recognitionon March 13, 2026 at 10:00 am
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he’ll demo it all at RSAC 2026
- Cyber fallout from the Iran war: What to have on your radaron March 12, 2026 at 2:17 pm
The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.
- Sednit reloaded: Back in the trencheson March 10, 2026 at 9:58 am
The resurgence of one of Russia’s most notorious APT groups
- What cybersecurity actually does for your businesson March 6, 2026 at 10:00 am
The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed
- How SMBs use threat research and MDR to build a defensive edgeon March 5, 2026 at 10:00 am
We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses
- Protecting education: How MDR can tip the balance in favor of schoolson March 4, 2026 at 10:00 am
The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?
- This month in security with Tony Anscombe – February 2026 editionon February 28, 2026 at 10:00 am
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools
- Mobile app permissions (still) matter more than you may thinkon February 27, 2026 at 10:00 am
Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks.
- Faking it on the phone: How to tell if a voice call is AI or noton February 23, 2026 at 10:00 am
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.
- PromptSpy ushers in the era of Android threats using GenAIon February 19, 2026 at 10:30 am
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow
- Is Poshmark safe? How to buy and sell without getting scammedon February 19, 2026 at 7:21 am
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.
- Is it OK to let your children post selfies online?on February 17, 2026 at 10:00 am
When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.
- Naming and shaming: How ransomware groups tighten the screws on victimson February 12, 2026 at 10:00 am
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle
- Taxing times: Top IRS scams to look out for in 2026on February 10, 2026 at 10:00 am
It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.
- OfferUp scammers are out in force: Here’s what you should knowon February 4, 2026 at 10:00 am
The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.
- A slippery slope: Beware of Winter Olympics scams and other cyberthreatson February 2, 2026 at 10:00 am
It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.
- This month in security with Tony Anscombe – January 2026 editionon January 30, 2026 at 3:20 pm
The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year




