FreshRSS

πŸ”’
☐ β˜† βœ‡ WeLiveSecurity

Will you give X your biometric data? – Week in security with Tony Anscombe

September 8th 2023 at 09:22
The update to X's privacy policy has sparked some questions among privacy and security folks, including how long X will retain users' biometric information and how the data will be stored and secured
☐ β˜† βœ‡ WeLiveSecurity

Staying ahead of threats: 5 cybercrime trends to watch

September 6th 2023 at 09:31
New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought
☐ β˜† βœ‡ WeLiveSecurity

Getting off the hook: 10 steps to take after clicking on a phishing link

September 4th 2023 at 09:30
Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and planting malware on their devices. The healing process does not end with antivirus scanning.
☐ β˜† βœ‡ WeLiveSecurity

Fake Signal and Telegram apps – Week in security with Tony Anscombe

August 31st 2023 at 13:10
ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites
☐ β˜† βœ‡ WeLiveSecurity

What you need to know about iCloud Private Relay

August 31st 2023 at 09:30
If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is your friend β€” but is it a true VPN service? The devil is in the details.
☐ β˜† βœ‡ WeLiveSecurity

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

August 30th 2023 at 09:30
ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs
☐ β˜† βœ‡ WeLiveSecurity

ESET Research Podcast: Unmasking MoustachedBouncer

August 10th 2023 at 19:49
Listen as ESET's Director of Threat Research Jean-Ian Boutin unravels the tactics, techniques and procedures of MoustachedBouncer, an APT group taking aim at foreign embassies in Belarus
☐ β˜† βœ‡ WeLiveSecurity

Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

August 28th 2023 at 09:30
The campaign started with a trojanized version of unsupported financial software
☐ β˜† βœ‡ WeLiveSecurity

How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe

August 25th 2023 at 13:53
ESET researchers uncover a Telegram bot that enables even less tech-savvy scammers to defraud people out of their money
☐ β˜† βœ‡ WeLiveSecurity

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

March 30th 2023 at 09:30
ESET experts share their insights on the cyber-elements of the first year of the war in Ukraine and how a growing number of destructive malware variants tried to rip through critical Ukrainian systems
☐ β˜† βœ‡ WeLiveSecurity

Telekopye: Hunting Mammoths using Telegram bot

August 24th 2023 at 09:30
Analysis of Telegram bot that helps cybercriminals scam people on online marketplaces
☐ β˜† βœ‡ WeLiveSecurity

Scarabs colon-izing vulnerable servers

August 22nd 2023 at 09:30
Analysis of Spacecolon, a toolset used to deploy Scarab ransomware on vulnerable servers, and its operators, CosmicBeetle
☐ β˜† βœ‡ WeLiveSecurity

A Bard’s Tale – how fake AI bots try to install malware

August 21st 2023 at 09:31
The AI race is on! It’s easy to lose track of the latest developments and possibilities, and yet everyone wants to see firsthand what the hype is about. Heydays for cybercriminals!
☐ β˜† βœ‡ WeLiveSecurity

Evacuation of 30,000 hackers – Week in security with Tony Anscombe

August 18th 2023 at 09:54
DEF CON, the annual hacker convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the event's venue due to a bomb threat
☐ β˜† βœ‡ WeLiveSecurity

Evacuation of 30,000 hackers – Week in security with Tony Anscombe

August 18th 2023 at 09:54
DEF CON, the annual hacker's convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the convention due to a bomb threat.
☐ β˜† βœ‡ WeLiveSecurity

DEF CON 31: US DoD urges hackers to go and hack β€˜AI’

August 18th 2023 at 09:31
The limits of current AI need to be tested before we can rely on their output
☐ β˜† βœ‡ WeLiveSecurity

Mass-spreading campaign targeting Zimbra users

August 17th 2023 at 09:54
ESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration email server.
☐ β˜† βœ‡ WeLiveSecurity

DEF CON 31: Robot vacuums may be doing more than they claim

August 16th 2023 at 09:35
When it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision.
☐ β˜† βœ‡ WeLiveSecurity

Black Hat 2023: Hacking the police (at least their radios)

August 15th 2023 at 09:30
Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure.
☐ β˜† βœ‡ WeLiveSecurity

Black Hat 2023: How AI changes the monetization of search

August 14th 2023 at 12:30
Search engines, AI, and monetization in the new era
☐ β˜† βœ‡ WeLiveSecurity

Black Hat 2023: AI gets big defender prize money

August 14th 2023 at 09:30
Black Hat is big on AI this year, and for a good reason
☐ β˜† βœ‡ WeLiveSecurity

Black Hat 2023: β€˜Teenage’ AI not enough for cyberthreat intelligence

August 12th 2023 at 15:12
Current LLMs are just not mature enough for high-level tasks
☐ β˜† βœ‡ WeLiveSecurity

20k security folks in the desert – Week in security with Tony Anscombe

August 11th 2023 at 11:38
Unsurprisingly, artificial intelligence took the center stage at this year's edition of Black Hat, one of the world's largest gatherings of cybersecurity professionals
☐ β˜† βœ‡ WeLiveSecurity

Black Hat 2023: Cyberwar fire-and-forget-me-not

August 11th 2023 at 09:29
What happens to cyberweapons after a cyberwar?
☐ β˜† βœ‡ WeLiveSecurity

MoustachedBouncer: Espionage against foreign diplomats in Belarus

August 10th 2023 at 09:03
Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again!
☐ β˜† βœ‡ WeLiveSecurity

Time is money, and online game scammers have lots of it

August 7th 2023 at 09:20
Gamers and cybersecurity professionals have something in common – the ever-terrible presence of hacking, scams, and data theft – but how and why would anyone want to target gamers?
☐ β˜† βœ‡ WeLiveSecurity

Check cybersecurity pre-invest – Week in security with Tony Anscombe

August 4th 2023 at 10:52
When you invest in a company, do you check its cybersecurity? The U.S. Securities and Exchange Commission has adopted new cybersecurity rules.
☐ β˜† βœ‡ WeLiveSecurity

Fingerprints all over: Can browser fingerprinting increase website security?

August 3rd 2023 at 09:25
Browser fingerprinting is supposedly a more privacy-conscious tracking method, replacing personal information with more general data. But is it a valid promise?
☐ β˜† βœ‡ WeLiveSecurity

The grand theft of Jake Moore’s voice: The concept of a virtual kidnap

August 2nd 2023 at 12:38
With powerful AI, it doesn’t take much to fake a person virtually, and while there are some limitations, voice-cloning can have some dangerous consequences.
☐ β˜† βœ‡ WeLiveSecurity

Quantum computing: Will it break crypto security within a few years?

August 1st 2023 at 09:32
Current cryptographic security methods watch out - quantum computing is coming for your lunch.
☐ β˜† βœ‡ WeLiveSecurity

Gathering dust and data: How robotic vacuums can spy on you

July 26th 2023 at 10:40
Mitigate the risk of data leaks with a careful review of the product and the proper settings.
☐ β˜† βœ‡ WeLiveSecurity

Is backdoor access oppressive? – Week in security with Tony Anscombe

July 28th 2023 at 11:57
Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by authority, human rights, and tech companies leaving the UK?
☐ β˜† βœ‡ WeLiveSecurity

Gathering dust and data: How robotic vacuums can spy on you.

July 26th 2023 at 10:40
Mitigate the risk of data leaks with a careful review of the product and the proper settings.
☐ β˜† βœ‡ WeLiveSecurity

Dear all, What are some common subject lines in phishing emails?

July 25th 2023 at 09:30
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.
☐ β˜† βœ‡ WeLiveSecurity

Dear all! What are some common subject lines in phishing emails?

July 25th 2023 at 09:30
Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency.
☐ β˜† βœ‡ WeLiveSecurity

What happens if AI is wrong? – Week in security with Tony Anscombe

July 24th 2023 at 05:11
Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?
☐ β˜† βœ‡ WeLiveSecurity

8 common work-from-home scams to avoid

July 24th 2023 at 05:11
That β€˜employer’ you’re speaking to may in reality be after your personal information, your money or your help with their illegal activities
☐ β˜† βœ‡ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

July 24th 2023 at 05:11
The growing use of synthetic media and the difficulties in distinguishing between real and fake content raise a slew of legal and ethical questions
☐ β˜† βœ‡ WeLiveSecurity

Android GravityRAT goes after WhatsApp backups

July 21st 2023 at 13:29
ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q4Β 2022­–Q1 2023

July 21st 2023 at 13:29
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4Β 2022 and Q1Β 2023
☐ β˜† βœ‡ WeLiveSecurity

Passwords out, passkeys in: are you ready to make the switch?

July 21st 2023 at 13:29
With passkeys poised for prime time, passwords seem passΓ©. What are the main benefits of ditching one in favor of the other?
☐ β˜† βœ‡ WeLiveSecurity

The danger within: 5 steps you can take to combat insider threats

July 21st 2023 at 13:29
Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar?
☐ β˜† βœ‡ WeLiveSecurity

Hunting down BlackLotus – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
☐ β˜† βœ‡ WeLiveSecurity

What TikTok knows about you – and what you should know about TikTok

July 21st 2023 at 13:29
As TikTok CEO attempts to placate U.S. lawmakers, it’s time for us all to think about the wealth of personal information that TikTok and other social media giants collect about us
☐ β˜† βœ‡ WeLiveSecurity

How the war in Ukraine has been a catalyst in private-public collaborations

July 21st 2023 at 13:29
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
☐ β˜† βœ‡ WeLiveSecurity

10 signs that scammers have you in their sights

July 21st 2023 at 13:29
Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing
☐ β˜† βœ‡ WeLiveSecurity

The good, the bad and the ugly of AI – Week in security with Tony Anscombe

July 21st 2023 at 13:29
The growing use of synthetic media and difficulties in distinguishing between real and fake content raises a slew of legal and ethical questions
☐ β˜† βœ‡ WeLiveSecurity

School’s out for summer, but it’s not time to let your cyber guard down

July 21st 2023 at 13:29
The beginning of the summer break is the perfect time for parents to remind their children about the importance of safe online habits
☐ β˜† βœ‡ WeLiveSecurity

Why you need parental control software – and 5 features to look for

July 21st 2023 at 13:29
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
☐ β˜† βœ‡ WeLiveSecurity

SVB's collapse is a scammer’s dream: Don’t get caught out

July 21st 2023 at 13:29
How cybercriminals can exploit Silicon Valley Bank's downfall for their own ends – and at your expense
☐ β˜† βœ‡ WeLiveSecurity

APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe

July 21st 2023 at 13:29
A request to move an online conversation to a supposedly more secure platform may not be as well-meaning as it sounds
☐ β˜† βœ‡ WeLiveSecurity

Staying safe on OnlyFans: The naked truth

July 21st 2023 at 13:29
How content creators and subscribers can embrace the social media platform without (overly) exposing themselves to the potentially toxic brew of NSFW content and privacy threats
☐ β˜† βœ‡ WeLiveSecurity

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

July 21st 2023 at 13:29
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys
☐ β˜† βœ‡ WeLiveSecurity

Is a RAT stealing your files? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans?
☐ β˜† βœ‡ WeLiveSecurity

Common WhatsApp scams and how to avoid them

July 21st 2023 at 13:29
Here's a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them.
☐ β˜† βœ‡ WeLiveSecurity

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

July 21st 2023 at 13:29
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report T3 2022

July 21st 2023 at 13:29
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
☐ β˜† βœ‡ WeLiveSecurity

You may not care where you download software from, but malware does

July 21st 2023 at 13:29
Why do people still download files from sketchy places and get compromised as a result?
☐ β˜† βœ‡ WeLiveSecurity

One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe

July 21st 2023 at 13:29
With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected?
☐ β˜† βœ‡ WeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

July 21st 2023 at 13:29
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
❌