WeLiveSecurity WeLiveSecurity
- Influencers in the crosshairs: How cybercriminals are targeting content creatorson November 25, 2025 at 10:00 am
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
- MDR is the answer – now, what’s the question?on November 24, 2025 at 10:00 am
Why your business needs the best-of-breed combination of technology and human expertise
- The OSINT advantage: Find your weak spots before attackers doon November 20, 2025 at 10:00 am
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
- PlushDaemon compromises network devices for adversary-in-the-middle attackson November 19, 2025 at 9:55 am
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
- What if your romantic AI chatbot can’t keep a secret?on November 17, 2025 at 10:00 am
Does your chatbot know too much? Here’s why you should think twice before you tell your AI companion everything.
- How password managers can be hacked – and how to stay safeon November 13, 2025 at 10:00 am
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
- Why shadow AI could be your biggest security blind spoton November 11, 2025 at 10:00 am
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
- In memoriam: David Harleyon November 7, 2025 at 1:46 pm
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
- The who, where, and how of APT attacks in Q2 2025–Q3 2025on November 7, 2025 at 12:34 pm
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
- ESET APT Activity Report Q2 2025–Q3 2025on November 6, 2025 at 9:45 am
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
- Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see comingon November 5, 2025 at 10:00 am
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
- How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)on November 4, 2025 at 10:00 am
Think you could never fall for an online scam? Think again. Here’s how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead
- Ground zero: 5 things to do after discovering a cyberattackon November 3, 2025 at 10:00 am
When every minute counts, preparation and precision can mean the difference between disruption and disaster
- This month in security with Tony Anscombe – October 2025 editionon October 31, 2025 at 10:00 am
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October’s headlines offer a glimpse of what’s shaping cybersecurity right now
- Fraud prevention: How to help older family members avoid scamson October 30, 2025 at 10:00 am
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically
- Cybersecurity Awareness Month 2025: When seeing isn’t believingon October 29, 2025 at 10:00 am
Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams
- Recruitment red flags: Can you spot a spy posing as a job seeker?on October 28, 2025 at 10:00 am
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms
- How MDR can give MSPs the edge in a competitive marketon October 27, 2025 at 10:00 am
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
- Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadowson October 24, 2025 at 11:53 am
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures
- Gotta fly: Lazarus targets the UAV sectoron October 23, 2025 at 4:00 am
ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group
- SnakeStealer: How it preys on personal data – and how you can protect yourselfon October 22, 2025 at 9:00 am
Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year’s infostealer detection charts
- Cybersecurity Awareness Month 2025: Building resilience against ransomwareon October 20, 2025 at 2:11 pm
Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
- Minecraft mods: Should you ‘hack’ your game?on October 16, 2025 at 9:00 am
Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
- IT service desks: The security blind spot that may put your business at riskon October 15, 2025 at 9:00 am
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
- Cybersecurity Awareness Month 2025: Why software patching matters more than everon October 14, 2025 at 2:21 pm
As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.
- AI-aided malvertising: Exploiting a chatbot to spread scamson October 13, 2025 at 9:00 am
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.
- How Uber seems to know where you are – even with restricted location permissionson October 9, 2025 at 9:00 am
Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.
- Cybersecurity Awareness Month 2025: Passwords alone are not enoughon October 8, 2025 at 10:08 am
Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders.
- The case for cybersecurity: Why successful businesses are built on protectionon October 7, 2025 at 9:00 am
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
- Beware of threats lurking in booby-trapped PDF fileson October 6, 2025 at 9:00 am
Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.




