FreshRSS

🔒
☐ ☆ ✇ WeLiveSecurity

BlackLotus UEFI bootkit: Myth confirmed

July 21st 2023 at 13:29
The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality
☐ ☆ ✇ WeLiveSecurity

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks
☐ ☆ ✇ WeLiveSecurity

Why you should spring clean your home network and audit your backups

July 21st 2023 at 13:29
Do you know how many devices are connected to your home network? You don’t? This is precisely why it’s time for a network audit.
☐ ☆ ✇ WeLiveSecurity

Avoiding data backup failures – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Today is World Backup Day, but maybe we also need a "did you test your backups" day?
☐ ☆ ✇ WeLiveSecurity

Asylum Ambuscade: crimeware or cyberespionage?

July 21st 2023 at 13:29
A curious case of a threat actor at the border between crimeware and cyberespionage
☐ ☆ ✇ WeLiveSecurity

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated
☐ ☆ ✇ WeLiveSecurity

Child identity theft: how do I keep my kids’ personal data safe?

By Phil Muncaster — July 19th 2023 at 09:30

Why is kids’ personal information in high demand, how do criminals steal it, and what can parents do to help prevent child identity theft?

The post Child identity theft: how do I keep my kids’ personal data safe? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour

By Tony Anscombe — July 18th 2023 at 09:30

There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud

The post Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe

By Editor — July 14th 2023 at 15:30

Here's how cybercriminals have adjusted their tactics in response to Microsoft's stricter security policies and other interesting findings from ESET's new Threat Report

The post Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The danger within: 5 steps you can take to combat insider threats

By Márk Szabó — July 13th 2023 at 09:30

Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?

The post The danger within: 5 steps you can take to combat insider threats appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Research Podcast: Finding the mythical BlackLotus bootkit

By ESET Research — July 12th 2023 at 09:30

A story of how an analysis of a supposed game cheat turned into the discovery of a powerful UEFI threat

The post ESET Research Podcast: Finding the mythical BlackLotus bootkit appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Threat Report H1 2023

By Roman Kováč — July 11th 2023 at 09:30

A view of the H1 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

The post ESET Threat Report H1 2023 appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Emotet: sold or on vacation? – Week in security with Tony Anscombe

By Editor — July 7th 2023 at 11:00

Originally a banking trojan, Emotet later evolved into a full-blown botnet and went on to become one of the most dangerous cyberthreats worldwide

The post Emotet: sold or on vacation? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What’s up with Emotet?

By Jakub Kaloč — July 6th 2023 at 09:30

A brief summary of what happened with Emotet since its comeback in November 2021

The post What’s up with Emotet? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Deepfaking it: What to know about deepfake‑driven sextortion schemes

By Phil Muncaster — July 4th 2023 at 09:30

Criminals increasingly create deepfake nudes from people’s benign public photos in order to extort money from them, the FBI warns

The post Deepfaking it: What to know about deepfake‑driven sextortion schemes appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Verizon 2023 DBIR: What’s new this year and top takeaways for SMBs

By Phil Muncaster — July 3rd 2023 at 09:30

Here are some of the key insights on the evolving data breach landscape as revealed by Verizon’s analysis of more than 16,000 incidents

The post Verizon 2023 DBIR: What’s new this year and top takeaways for SMBs appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

By Editor — June 30th 2023 at 13:15

The growing use of synthetic media and difficulties in distinguishing between real and fake content raises a slew of legal and ethical questions

The post The good, the bad and the ugly of AI – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Employee monitoring: Is ‘bossware’ right for your company?

By Phil Muncaster — June 29th 2023 at 09:30

While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees

The post Employee monitoring: Is ‘bossware’ right for your company? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Avoid juice jacking and recharge your batteries safely this summer

By Márk Szabó — June 28th 2023 at 09:30

Cybercriminals can use USB charging stations in airports, hotels, malls or other public spaces as conduits for malware

The post Avoid juice jacking and recharge your batteries safely this summer appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

School’s out for summer, but it’s not time to let your cyber guard down

By Phil Muncaster — June 27th 2023 at 09:30

The beginning of the summer break is the perfect time for parents to remind their children about the importance of safe online habits

The post School’s out for summer, but it’s not time to let your cyber guard down appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What to know about the MOVEit hack – Week in security with Tony Anscombe

By Editor — June 23rd 2023 at 13:30

The US government has now announced a bounty of $10 million for intel linking the Cl0p ransomware gang to a foreign government

The post What to know about the MOVEit hack – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Maltego: Check how exposed you are online

By Sol González — June 22nd 2023 at 09:30

A primer on how to use this powerful tool for uncovering and connecting information from publicly available sources

The post Maltego: Check how exposed you are online appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Going on vacation soon? Stay one step ahead of travel scams

By Phil Muncaster — June 21st 2023 at 09:30

From bogus free trips to fake rental homes, here are some of the most common online threats you should look out for both before and during your travels

The post Going on vacation soon? Stay one step ahead of travel scams appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Passwords out, passkeys in: are you ready to make the switch?

By Phil Muncaster — June 20th 2023 at 09:30

With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching one in favor of the other?

The post Passwords out, passkeys in: are you ready to make the switch? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Is a RAT stealing your files? – Week in security with Tony Anscombe

By Editor — June 16th 2023 at 15:20

Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans?

The post Is a RAT stealing your files? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Stop Cyberbullying Day: Prevention is everyone’s responsibility

By Márk Szabó — June 16th 2023 at 09:30

Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves

The post Stop Cyberbullying Day: Prevention is everyone’s responsibility appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Android GravityRAT goes after WhatsApp backups

By Lukas Stefanko — June 15th 2023 at 09:30

ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files

The post Android GravityRAT goes after WhatsApp backups appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cyber insurance: What is it and does my company need it?

By Phil Muncaster — June 13th 2023 at 09:30

While not a 'get out of jail free card' for your business, cyber insurance can help insulate it from the financial impact of a cyber-incident

The post Cyber insurance: What is it and does my company need it? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

By Editor — June 9th 2023 at 12:30

A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities

The post Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Asylum Ambuscade: crimeware or cyberespionage?

By Matthieu Faou — June 8th 2023 at 09:30

A curious case of a threat actor at the border between crimeware and cyberespionage

The post Asylum Ambuscade: crimeware or cyberespionage? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Hear no evil: Ultrasound attacks on voice assistants

By Márk Szabó — June 7th 2023 at 09:30

How your voice assistant could do the bidding of a hacker – without you ever hearing a thing

The post Hear no evil: Ultrasound attacks on voice assistants appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

7 tips for spotting a fake mobile app

By Roman Cuprik — June 6th 2023 at 09:30

Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future

The post 7 tips for spotting a fake mobile app appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

API security in the spotlight – Week in security with Tony Anscombe

By Editor — June 2nd 2023 at 12:30

Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.

The post API security in the spotlight – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

All eyes on APIs: Top 3 API security risks and how to mitigate them

By Phil Muncaster — June 1st 2023 at 09:30

As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency

The post All eyes on APIs: Top 3 API security risks and how to mitigate them appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 free OSINT tools for social media

By Martina López — May 31st 2023 at 09:30

A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms

The post 5 free OSINT tools for social media appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme

By Roman Cuprik — May 30th 2023 at 09:30

A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys

The post Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

By Editor — May 26th 2023 at 14:15

ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool

The post How an innocuous app morphed into a trojan – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Shedding light on AceCryptor and its operation

By Jakub Kaloč — May 25th 2023 at 09:30

ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families

The post Shedding light on AceCryptor and its operation appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Digital security for the self‑employed: Staying safe without an IT team to help

By Phil Muncaster — May 24th 2023 at 09:30

Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business

The post Digital security for the self‑employed: Staying safe without an IT team to help appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

By Lukas Stefanko — May 23rd 2023 at 09:30

ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio

The post Android app breaking bad: From legitimate screen recording to file exfiltration within a year appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The real cost of a free lunch – Week in security with Tony Anscombe

By Editor — May 19th 2023 at 12:30

Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for

The post The real cost of a free lunch – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Top 5 search engines for internet‑connected devices and services

By Camilo Gutiérrez Amaya — May 18th 2023 at 09:30

A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet

The post Top 5 search engines for internet‑connected devices and services appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Meet “AI”, your new colleague: could it expose your company’s secrets?

By Roman Cuprik — May 17th 2023 at 09:30

Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk

The post Meet “AI”, your new colleague: could it expose your company’s secrets? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

You may not care where you download software from, but malware does

By Aryeh Goretsky — May 16th 2023 at 09:30

Why do people still download files from sketchy places and get compromised as a result?

The post You may not care where you download software from, but malware does appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe

By Editor — May 12th 2023 at 15:15

What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?

The post Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Why you need parental control software – and 5 features to look for

By Phil Muncaster — May 12th 2023 at 09:30

Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize

The post Why you need parental control software – and 5 features to look for appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Turning on stealth mode: 5 simple strategies for staying under the radar online

By André Lameiras — May 10th 2023 at 09:30

Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details

The post Turning on stealth mode: 5 simple strategies for staying under the radar online appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET APT Activity Report Q4 2022­–Q1 2023

By Jean-Ian Boutin — May 9th 2023 at 09:30

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023

The post ESET APT Activity Report Q4 2022­–Q1 2023 appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How the war in Ukraine has been a catalyst in private‑public collaborations

By André Lameiras — May 9th 2023 at 08:00

As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital

The post How the war in Ukraine has been a catalyst in private‑public collaborations appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

APTs target MSP access to customer networks – Week in security with Tony Anscombe

By Editor — May 5th 2023 at 14:00

The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers

The post APTs target MSP access to customer networks – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Creating strong, yet user‑friendly passwords: Tips for your business password policy

By Roman Cuprik — May 4th 2023 at 09:30

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization

The post Creating strong, yet user‑friendly passwords: Tips for your business password policy appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Using Discord? Don’t play down its privacy and security risks

By Márk Szabó — May 3rd 2023 at 09:30

It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut

The post Using Discord? Don’t play down its privacy and security risks appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

APT groups muddying the waters for MSPs

By James Shepperd — May 2nd 2023 at 09:30

A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers

The post APT groups muddying the waters for MSPs appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

By Editor — April 28th 2023 at 14:30

The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated

The post What was hot at RSA Conference 2023? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA Conference 2023 – How AI will infiltrate the world

By Cameron Camp — April 26th 2023 at 14:30

As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications

The post RSA Conference 2023 – How AI will infiltrate the world appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Evasive Panda APT group delivers malware via updates for popular Chinese software

By Facundo Muñoz — April 26th 2023 at 09:30

ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software

The post Evasive Panda APT group delivers malware via updates for popular Chinese software appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

By Editor — April 21st 2023 at 10:00

Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks

The post Did you mistakenly sell your network access? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack

By Peter Kálnai — April 20th 2023 at 09:30

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack

The post Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The EU’s Cyber Solidarity Act: Security Operations Centers to the rescue!

By Márk Szabó — April 19th 2023 at 13:15

The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents

The post The EU’s Cyber Solidarity Act: Security Operations Centers to the rescue! appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

PC running slow? 10 ways you can speed it up

By André Lameiras — April 19th 2023 at 09:30

Before you rush to buy new hardware, try these simple tricks to get your machine up to speed again – and keep it that way.

The post PC running slow? 10 ways you can speed it up appeared first on WeLiveSecurity

❌