WeLiveSecurity WeLiveSecurity
- Black Hat Europe 2025: Was that device designed to be on the internet at all?on December 12, 2025 at 3:22 pm
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
- Black Hat Europe 2025: Reputation matters – even in the ransomware economyon December 11, 2025 at 4:04 pm
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims
- Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurityon December 11, 2025 at 10:00 am
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
- Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpieceon December 10, 2025 at 3:03 pm
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
- The big catch: How whaling attacks target top executiveson December 9, 2025 at 10:00 am
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
- Phishing, privileges and passwords: Why identity is critical to improving cybersecurity postureon December 4, 2025 at 10:00 am
Identity is effectively the new network boundary. It must be protected at all costs.
- MuddyWater: Snakes by the riverbankon December 2, 2025 at 10:00 am
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook
- Oversharing is not caring: What’s at stake if your employees post too much onlineon December 1, 2025 at 10:00 am
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
- This month in security with Tony Anscombe – November 2025 editionon November 28, 2025 at 1:46 pm
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month’s cybersecurity news
- What parents should know to protect their children from doxxingon November 27, 2025 at 10:00 am
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.
- Influencers in the crosshairs: How cybercriminals are targeting content creatorson November 25, 2025 at 10:00 am
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
- MDR is the answer – now, what’s the question?on November 24, 2025 at 10:00 am
Why your business needs the best-of-breed combination of technology and human expertise
- The OSINT advantage: Find your weak spots before attackers doon November 20, 2025 at 10:00 am
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
- PlushDaemon compromises network devices for adversary-in-the-middle attackson November 19, 2025 at 9:55 am
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
- What if your romantic AI chatbot can’t keep a secret?on November 17, 2025 at 10:00 am
Does your chatbot know too much? Here’s why you should think twice before you tell your AI companion everything.
- How password managers can be hacked – and how to stay safeon November 13, 2025 at 10:00 am
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
- Why shadow AI could be your biggest security blind spoton November 11, 2025 at 10:00 am
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
- In memoriam: David Harleyon November 7, 2025 at 1:46 pm
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
- The who, where, and how of APT attacks in Q2 2025–Q3 2025on November 7, 2025 at 12:34 pm
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
- ESET APT Activity Report Q2 2025–Q3 2025on November 6, 2025 at 9:45 am
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025






