FreshRSS

πŸ”’
☐ β˜† βœ‡ WeLiveSecurity

Employee monitoring: Is β€˜bossware’ right for your company?

June 29th 2023 at 11:30
While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees
☐ β˜† βœ‡ WeLiveSecurity

School’s out for summer, but it’s not time to let your cyber guard down

June 27th 2023 at 11:30
The beginning of the summer break is the perfect time for parents to remind their children about the importance of safe online habits
☐ β˜† βœ‡ WeLiveSecurity

What to know about the MOVEit hack – Week in security with Tony Anscombe

June 23rd 2023 at 15:30
The US government has now announced a bounty of $10 million for intel linking the Cl0p ransomware gang to a foreign government
☐ β˜† βœ‡ WeLiveSecurity

Maltego: Check how exposed you are online

June 22nd 2023 at 11:30
A primer on how to use this powerful tool for uncovering and connecting information from publicly available sources
☐ β˜† βœ‡ WeLiveSecurity

Going on vacation soon? Stay one step ahead of travel scams

June 21st 2023 at 11:30
From bogus free trips to fake rental homes, here are some of the most common online threats you should look out for both before and during your travels
☐ β˜† βœ‡ WeLiveSecurity

Passwords out, passkeys in: are you ready to make the switch?

June 20th 2023 at 11:30
With passkeys poised for prime time, passwords seem passΓ©. What are the main benefits of ditching one in favor of the other?
☐ β˜† βœ‡ WeLiveSecurity

Is a RAT stealing your files? – Week in security with Tony Anscombe

June 16th 2023 at 17:20
Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans?
☐ β˜† βœ‡ WeLiveSecurity

Stop Cyberbullying Day: Prevention is everyone's responsibility

June 16th 2023 at 11:30
Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves
☐ β˜† βœ‡ WeLiveSecurity

Android GravityRAT goes after WhatsApp backups

June 15th 2023 at 11:30
ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files
☐ β˜† βœ‡ WeLiveSecurity

Cyber insurance: What is it and does my company need it?

June 13th 2023 at 11:30
While not a 'get out of jail free card' for your business, cyber insurance can help insulate it from the financial impact of a cyber-incident
☐ β˜† βœ‡ WeLiveSecurity

Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe

June 9th 2023 at 14:30
A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities
☐ β˜† βœ‡ WeLiveSecurity

Asylum Ambuscade: crimeware or cyberespionage?

June 8th 2023 at 11:30
A curious case of a threat actor at the border between crimeware and cyberespionage
☐ β˜† βœ‡ WeLiveSecurity

Hear no evil: Ultrasound attacks on voice assistants

June 7th 2023 at 11:30
HowΒ your voice assistant could do the bidding of a hacker – without you ever hearing a thing
☐ β˜† βœ‡ WeLiveSecurity

7 tips for spotting a fake mobile app

June 6th 2023 at 11:30
Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future
☐ β˜† βœ‡ WeLiveSecurity

API security in the spotlight – Week in security with Tony Anscombe

June 2nd 2023 at 14:30
Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought.
☐ β˜† βœ‡ WeLiveSecurity

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1st 2023 at 11:30
As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency
☐ β˜† βœ‡ WeLiveSecurity

5 free OSINT tools for social media

May 31st 2023 at 11:30
A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms
☐ β˜† βœ‡ WeLiveSecurity

Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme

May 30th 2023 at 11:30
A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys
☐ β˜† βœ‡ WeLiveSecurity

How an innocuous app morphed into a trojan – Week in security with Tony Anscombe

May 26th 2023 at 16:15
ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool
☐ β˜† βœ‡ WeLiveSecurity

Shedding light on AceCryptor and its operation

May 25th 2023 at 11:30
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families
☐ β˜† βœ‡ WeLiveSecurity

Digital security for the self-employed: Staying safe without an IT team to help

May 24th 2023 at 11:30
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business
☐ β˜† βœ‡ WeLiveSecurity

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

May 23rd 2023 at 11:30
ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio
☐ β˜† βœ‡ WeLiveSecurity

The real cost of a free lunch – Week in security with Tony Anscombe

May 19th 2023 at 14:30
Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for
☐ β˜† βœ‡ WeLiveSecurity

Top 5 search engines for internet-connected devices and services

May 18th 2023 at 11:30
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
☐ β˜† βœ‡ WeLiveSecurity

Meet β€œAI”, your new colleague: could it expose your company's secrets?

May 17th 2023 at 11:30
Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk
☐ β˜† βœ‡ WeLiveSecurity

You may not care where you download software from, but malware does

May 16th 2023 at 11:30
Why do people still download files from sketchy places and get compromised as a result?
☐ β˜† βœ‡ WeLiveSecurity

Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe

May 12th 2023 at 17:15
What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?
☐ β˜† βœ‡ WeLiveSecurity

Why you need parental control software – and 5 features to look for

May 12th 2023 at 11:30
Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize
☐ β˜† βœ‡ WeLiveSecurity

Turning on stealth mode: 5 simple strategies for staying under the radar online

May 10th 2023 at 11:30
Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q4Β 2022­–Q1 2023

May 9th 2023 at 11:30
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4Β 2022 and Q1Β 2023
☐ β˜† βœ‡ WeLiveSecurity

How the war in Ukraine has been a catalyst in private-public collaborations

May 9th 2023 at 10:00
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
☐ β˜† βœ‡ WeLiveSecurity

APTs target MSP access to customer networks – Week in security with Tony Anscombe

May 5th 2023 at 16:00
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers
☐ β˜† βœ‡ WeLiveSecurity

Creating strong, yet user-friendly passwords: Tips for your business password policy

May 4th 2023 at 11:30
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization
☐ β˜† βœ‡ WeLiveSecurity

Using Discord? Don’t play down its privacy and security risks

May 3rd 2023 at 11:30
It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut
☐ β˜† βœ‡ WeLiveSecurity

APT groups muddying the waters for MSPs

May 2nd 2023 at 11:30
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers
☐ β˜† βœ‡ WeLiveSecurity

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

April 28th 2023 at 16:30
The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated
☐ β˜† βœ‡ WeLiveSecurity

RSA Conference 2023 – How AI will infiltrate the world

April 26th 2023 at 16:30
As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications
☐ β˜† βœ‡ WeLiveSecurity

Evasive Panda APT group delivers malware via updates for popular Chinese software

April 26th 2023 at 11:30
ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software
☐ β˜† βœ‡ WeLiveSecurity

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

April 21st 2023 at 12:00
Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks
☐ β˜† βœ‡ WeLiveSecurity

Linux malware strengthens links between Lazarus and the 3CX supply-chain attack

April 20th 2023 at 11:30
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
☐ β˜† βœ‡ WeLiveSecurity

The EU's Cyber Solidarity Act: Security Operations Centers to the rescue!

April 19th 2023 at 15:15
The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents
☐ β˜† βœ‡ WeLiveSecurity

PC running slow? 10 ways you can speed it up

April 19th 2023 at 11:30
Before you rush to buy new hardware, try these simple tricks to get your machine up to speed again – and keep it that way.
☐ β˜† βœ‡ WeLiveSecurity

Discarded, not destroyed: Old routers reveal corporate secrets

April 18th 2023 at 15:00
When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'
☐ β˜† βœ‡ WeLiveSecurity

Hunting down BlackLotus – Week in security with Tony Anscombe

April 14th 2023 at 13:00
Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers
☐ β˜† βœ‡ WeLiveSecurity

Safety first: 5 cybersecurity tips for freelance bloggers

April 14th 2023 at 11:30
The much-dreaded writer’s block isn’t the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers?
☐ β˜† βœ‡ WeLiveSecurity

What are the cybersecurity concerns of SMBs by sector?

April 12th 2023 at 11:30
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured
☐ β˜† βœ‡ WeLiveSecurity

10 things to look out for when buying a password manager

April 11th 2023 at 11:30
Here's how to choose the right password vault for you and what exactly to consider when weighing your options
☐ β˜† βœ‡ WeLiveSecurity

Steer clear of tax scams – Week in security with Tony Anscombe

April 6th 2023 at 16:15
In a rush to file your taxes? Watch out for cybercriminals preying on stressed taxpayers as Tax Day looms large on the horizon.
☐ β˜† βœ‡ WeLiveSecurity

Cleaning up your social media and passwords: What to trash and what to treasure

April 6th 2023 at 11:30
Give your social media presence a good spring scrubbing, audit your passwords and other easy ways to bring order to your digital chaos
☐ β˜† βœ‡ WeLiveSecurity

Why you should spring clean your home network and audit your backups

April 5th 2023 at 11:30
Do you know how many devices are connected to your home network? You don’t? This is precisely why it’s time for a network audit.
☐ β˜† βœ‡ WeLiveSecurity

Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe

September 14th 2023 at 14:01
Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States
☐ β˜† βœ‡ WeLiveSecurity

Read it right! How to spot scams on Reddit

September 13th 2023 at 09:31
Do you know what types of scams and other fakery you should look out for when using a platform that once billed itself as β€œthe front page of the Internet”?
☐ β˜† βœ‡ WeLiveSecurity

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

September 12th 2023 at 09:31
Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims
☐ β˜† βœ‡ WeLiveSecurity

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor

September 11th 2023 at 09:30
ESET Research uncovers the Sponsoring Access campaign, which utilizes an undocumented Ballistic Bobcat backdoor we have named Sponsor
☐ β˜† βœ‡ WeLiveSecurity

Will you give X your biometric data? – Week in security with Tony Anscombe

September 8th 2023 at 09:22
The update to X's privacy policy has sparked some questions among privacy and security folks, including how long X will retain users' biometric information and how the data will be stored and secured
☐ β˜† βœ‡ WeLiveSecurity

Staying ahead of threats: 5 cybercrime trends to watch

September 6th 2023 at 09:31
New reports from Europol and the UK’s National Crime Agency (NCA) shed a light on how the battle against cybercrime is being fought
☐ β˜† βœ‡ WeLiveSecurity

Getting off the hook: 10 steps to take after clicking on a phishing link

September 4th 2023 at 09:30
Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and planting malware on their devices. The healing process does not end with antivirus scanning.
☐ β˜† βœ‡ WeLiveSecurity

Fake Signal and Telegram apps – Week in security with Tony Anscombe

August 31st 2023 at 13:10
ESET research uncovers active campaigns targeting Android users and spreading espionage code through the Google Play store, Samsung Galaxy Store and dedicated websites
☐ β˜† βœ‡ WeLiveSecurity

What you need to know about iCloud Private Relay

August 31st 2023 at 09:30
If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is your friend β€” but is it a true VPN service? The devil is in the details.
☐ β˜† βœ‡ WeLiveSecurity

BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps

August 30th 2023 at 09:30
ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has previously targeted Uyghurs
❌