WeLiveSecurity WeLiveSecurity
- Recovery scammers hit you when you’re down: Here’s how to avoid a second strikeon April 10, 2026 at 9:00 am
If you’ve been the victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse.
- As breakout time accelerates, prevention-first cybersecurity takes center stageon April 7, 2026 at 9:00 am
Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.
- Digital assets after death: Managing risks to your loved one’s digital estateon April 1, 2026 at 9:00 am
Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.
- This month in security with Tony Anscombe – March 2026 editionon March 31, 2026 at 8:27 am
The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan
- RSAC 2026 wrap-up – Week in security with Tony Anscombeon March 27, 2026 at 10:38 am
This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven’t caught up with
- A cunning predator: How Silver Fox preys on Japanese firms this tax seasonon March 27, 2026 at 7:00 am
Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them
- Virtual machines, virtually everywhere – and with real security gapson March 25, 2026 at 10:00 am
Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to fend for themselves
- Cloud workload security: Mind the gapson March 24, 2026 at 10:00 am
As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning
- Move fast and save things: A quick guide to recovering a hacked accounton March 20, 2026 at 10:00 am
What you do – and how fast – after an account is compromised often matters more than it may seem
- EDR killers explained: Beyond the driverson March 19, 2026 at 9:55 am
ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers
- Face value: What it takes to fool facial recognitionon March 13, 2026 at 10:00 am
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he’ll demo it all at RSAC 2026
- Cyber fallout from the Iran war: What to have on your radaron March 12, 2026 at 2:17 pm
The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.
- Sednit reloaded: Back in the trencheson March 10, 2026 at 9:58 am
The resurgence of one of Russia’s most notorious APT groups
- What cybersecurity actually does for your businesson March 6, 2026 at 10:00 am
The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed
- How SMBs use threat research and MDR to build a defensive edgeon March 5, 2026 at 10:00 am
We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses
- Protecting education: How MDR can tip the balance in favor of schoolson March 4, 2026 at 10:00 am
The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?
- This month in security with Tony Anscombe – February 2026 editionon February 28, 2026 at 10:00 am
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools
- Mobile app permissions (still) matter more than you may thinkon February 27, 2026 at 10:00 am
Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks.
- Faking it on the phone: How to tell if a voice call is AI or noton February 23, 2026 at 10:00 am
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.
- PromptSpy ushers in the era of Android threats using GenAIon February 19, 2026 at 10:30 am
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow
- Is Poshmark safe? How to buy and sell without getting scammedon February 19, 2026 at 7:21 am
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.
- Is it OK to let your children post selfies online?on February 17, 2026 at 10:00 am
When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.
- Naming and shaming: How ransomware groups tighten the screws on victimson February 12, 2026 at 10:00 am
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle
- Taxing times: Top IRS scams to look out for in 2026on February 10, 2026 at 10:00 am
It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.
- OfferUp scammers are out in force: Here’s what you should knowon February 4, 2026 at 10:00 am
The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.
- A slippery slope: Beware of Winter Olympics scams and other cyberthreatson February 2, 2026 at 10:00 am
It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.
- This month in security with Tony Anscombe – January 2026 editionon January 30, 2026 at 3:20 pm
The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year
- DynoWiper update: Technical analysis and attributionon January 30, 2026 at 10:28 am
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector
- Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistanon January 28, 2026 at 9:59 am
ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
- Drowning in spam or scam emails? Here’s probably whyon January 27, 2026 at 10:00 am
Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.






