FreshRSS

πŸ”’
☐ β˜† βœ‡ WeLiveSecurity

The who, where, and how of APT attacks – Week in security with Tony Anscombe

May 17th 2024 at 16:09
This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape
☐ β˜† βœ‡ WeLiveSecurity

To the Moon and back(doors): Lunar landing in diplomatic missions

May 15th 2024 at 09:15
ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs
☐ β˜† βœ‡ WeLiveSecurity

Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain

May 14th 2024 at 10:50
One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q4 2023–Q1 2024

May 14th 2024 at 10:41
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024
☐ β˜† βœ‡ WeLiveSecurity

How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe

May 10th 2024 at 19:44
We spoke to climate scientist Katharine Hayhoe about climate change, faith and psychology – and how to channel anxiety about the state of our planet into meaningful action
☐ β˜† βœ‡ WeLiveSecurity

In it to win it! WeLiveSecurity shortlisted for European Cybersecurity Blogger Awards

May 10th 2024 at 17:36
We’re thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates – Best Cybersecurity Vendor Blog category of the European Cybersecurity Blogger Awards 2024
☐ β˜† βœ‡ WeLiveSecurity

It's a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe

May 10th 2024 at 11:46
More than 40,000 security experts descended on San Francisco this week. Let's now look back on some of the event's highlights – including the CISA-led 'Secure by Design' pledge also signed by ESET.
☐ β˜† βœ‡ WeLiveSecurity

RSA Conference 2024: AI hype overload

May 9th 2024 at 18:41
Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations.
☐ β˜† βœ‡ WeLiveSecurity

Inspiring the next generation of scientists | Unlocked 403: Cybersecurity podcast

May 7th 2024 at 15:23
As Starmus Earth draws near, we caught up with Dr. Garik Israelian to celebrate the fusion of science and creativity and venture where imagination flourishes and groundbreaking ideas take flight
☐ β˜† βœ‡ WeLiveSecurity

The hacker’s toolkit: 4 gadgets that could spell security trouble

May 6th 2024 at 09:30
Their innocuous looks and endearing names mask their true power. These gadgets are designed to help identify and prevent security woes, but what if they fall into the wrong hands?
☐ β˜† βœ‡ WeLiveSecurity

Pay up, or else? – Week in security with Tony Anscombe

May 3rd 2024 at 14:59
Organizations that fall victim to a ransomware attack are often caught between a rock and a hard place, grappling with the dilemma of whether to pay up or not
☐ β˜† βœ‡ WeLiveSecurity

Adding insult to injury: crypto recovery scams

May 2nd 2024 at 09:30
Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over
☐ β˜† βœ‡ WeLiveSecurity

MDR: Unlocking the power of enterprise-grade security for businesses of all sizes

April 30th 2024 at 09:30
Faced with expanding attack surfaces and a barrage of threats, businesses of all sizes are increasingly looking to unlock the manifold capabilities of enterprise-grade security
☐ β˜† βœ‡ WeLiveSecurity

How space exploration benefits life on Earth: An interview with David Eicher

April 29th 2024 at 19:27
We spoke to Astronomy magazine editor-in-chief David Eicher about key challenges facing our planet, the importance of space exploration for humanity, and the possibility of life beyond Earth
☐ β˜† βœ‡ WeLiveSecurity

Major phishing-as-a-service platform disrupted – Week in security with Tony Anscombe

April 26th 2024 at 13:28
The investigation uncovered at least 40,000 phishing domains that were linked to LabHost and tricked victims into handing over their sensitive details
☐ β˜† βœ‡ WeLiveSecurity

Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals

April 25th 2024 at 09:30
Python’s versatility and short learning curve are just two factors that explain the language’s 'grip' on cybersecurity
☐ β˜† βœ‡ WeLiveSecurity

What makes Starmus unique? Q&A with award-winning filmmaker Todd Miller

April 24th 2024 at 09:02
The director of the Apollo 11 movie shares his views about the role of technology in addressing pressing global challenges, as well as why he became involved with Starmus
☐ β˜† βœ‡ WeLiveSecurity

How technology drives progress: Q&A with Nobel laureate Michel Mayor

April 23rd 2024 at 13:33
We spoke to Michel Mayor about the importance of public engagement with science and how to foster responsibility among the youth for the preservation of our changing planet
☐ β˜† βœ‡ WeLiveSecurity

The vision behind Starmus: Q&A with the festival’s co-founder Garik Israelian

April 23rd 2024 at 09:36
Dr. Israelian talks about Starmus's vision and mission, the importance of inspiring and engaging audiences, and a sense of community within the Starmus universe
☐ β˜† βœ‡ WeLiveSecurity

Protecting yourself after a medical data breach – Week in security with Tony Anscombe

April 19th 2024 at 13:14
What are the risks and consequences of having your health data exposed and what are the steps to take if it happens to you?
☐ β˜† βœ‡ WeLiveSecurity

The many faces of impersonation fraud: Spot an imposter before it’s too late

April 18th 2024 at 09:30
What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be?
☐ β˜† βœ‡ WeLiveSecurity

The ABCs of how online ads can impact children’s well-being

April 16th 2024 at 09:30
From promoting questionable content to posing security risks, inappropriate ads present multiple dangers for children. Here’s how to help them stay safe.
☐ β˜† βœ‡ WeLiveSecurity

Bitcoin scams, hacks and heists – and how to avoid them

April 15th 2024 at 09:30
Here’s how cybercriminals target cryptocurrencies and how you can keep your bitcoin or other crypto safe
☐ β˜† βœ‡ WeLiveSecurity

eXotic Visit includes XploitSPY malware – Week in security with Tony Anscombe

April 12th 2024 at 14:05
Almost 400 people in India and Pakistan have fallen victim to an ongoing Android espionage campaign called eXotic Visit
☐ β˜† βœ‡ WeLiveSecurity

Beyond fun and games: Exploring privacy risks in children’s apps

April 11th 2024 at 09:30
Should children’s apps come with β€˜warning labels’? Here's how to make sure your children's digital playgrounds are safe places to play and learn.
☐ β˜† βœ‡ WeLiveSecurity

eXotic Visit campaign: Tracing the footprints of Virtual Invaders

April 10th 2024 at 10:31
ESET researchers uncovered the eXotic Visit espionage campaign that targets users mainly in India and Pakistan with seemingly innocuous apps
☐ β˜† βœ‡ WeLiveSecurity

7 reasons why cybercriminals want your personal data

April 8th 2024 at 09:30
Here's what drives cybercriminals to relentlessly target the personal information of other people – and why you need to guard your data like your life depends on it
☐ β˜† βœ‡ WeLiveSecurity

The devil is in the fine print – Week in security with Tony Anscombe

April 5th 2024 at 11:58
Temu's cash giveaway where people were asked to hand over vast amounts of their personal data to the platform puts the spotlight on the data-slurping practices of online services today
☐ β˜† βœ‡ WeLiveSecurity

How often should you change your passwords?

April 3rd 2024 at 09:30
And is that actually the right question to ask? Here’s what else you should consider when it comes to keeping your accounts safe.
☐ β˜† βœ‡ WeLiveSecurity

Malware hiding in pictures? More likely than you think

April 2nd 2024 at 09:30
There is more to some images than meets the eye – their seemingly innocent faΓ§ade can mask a sinister threat.
☐ β˜† βœ‡ WeLiveSecurity

RDP remains a security concern – Week in security with Tony Anscombe

March 29th 2024 at 10:24
Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result
☐ β˜† βœ‡ WeLiveSecurity

Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

March 28th 2024 at 10:30
This rundown of 10 cyberattacks against the sports industry shows why every team needs to keep its eyes on the ball when it comes to cybersecurity
☐ β˜† βœ‡ WeLiveSecurity

Borrower beware: Common loan scams and how to avoid them

March 26th 2024 at 10:30
Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan.
☐ β˜† βœ‡ WeLiveSecurity

Cybersecurity starts at home: Help your children stay safe online with open conversations

March 25th 2024 at 10:30
Struggle to know how to help children and teens stay safe in cyberspace? A good ol’ fashioned chat is enough to put them on the right track.
☐ β˜† βœ‡ WeLiveSecurity

AceCryptor attacks surge in Europe – Week in security with Tony Anscombe

March 22nd 2024 at 12:21
The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed the Rescoms RAT
☐ β˜† βœ‡ WeLiveSecurity

Rescoms rides waves of AceCryptor spam

March 20th 2024 at 10:30
Insight into ESET telemetry statistics about AceCryptor in H2 2023 with a focus on Rescoms campaigns in European countries
☐ β˜† βœ‡ WeLiveSecurity

A prescription for privacy protection: Exercise caution when using a mobile health app

March 19th 2024 at 10:30
Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data
☐ β˜† βœ‡ WeLiveSecurity

Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe

March 15th 2024 at 11:20
Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023
☐ β˜† βœ‡ WeLiveSecurity

Threat intelligence explained | Unlocked 403: Cybersecurity podcast

March 14th 2024 at 13:30
We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats
☐ β˜† βœ‡ WeLiveSecurity

How to share sensitive files securely online

March 13th 2024 at 10:30
Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe
☐ β˜† βœ‡ WeLiveSecurity

Election cybersecurity: Protecting the ballot box and building trust in election integrity

March 12th 2024 at 10:30
What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?
☐ β˜† βœ‡ WeLiveSecurity

APT attacks taking aim at Tibetans – Week in security with Tony Anscombe

March 8th 2024 at 12:35
Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor
☐ β˜† βœ‡ WeLiveSecurity

Evasive Panda leverages Monlam Festival to target Tibetans

March 7th 2024 at 10:30
ESET researchers uncover strategic web compromise and supply-chain attacks targeting Tibetans
☐ β˜† βœ‡ WeLiveSecurity

Top 10 scams targeting seniors – and how to keep your money safe

March 6th 2024 at 10:30
The internet can be a wonderful place. But it’s also awash with fraudsters preying on people who are susceptible to fraud.
☐ β˜† βœ‡ WeLiveSecurity

Irresistible: Hooks, habits and why you can’t put down your phone

March 5th 2024 at 10:30
Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices.
☐ β˜† βœ‡ WeLiveSecurity

Deceptive AI content and 2024 elections – Week in security with Tony Anscombe

March 1st 2024 at 11:18
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year
☐ β˜† βœ‡ WeLiveSecurity

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

February 29th 2024 at 10:30
Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor
☐ β˜† βœ‡ WeLiveSecurity

Vulnerabilities in business VPNs under the spotlight

February 28th 2024 at 10:30
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk
☐ β˜† βœ‡ WeLiveSecurity

10 things to avoid posting on social media – and why

February 26th 2024 at 10:30
Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.
☐ β˜† βœ‡ WeLiveSecurity

PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombe

February 23rd 2024 at 12:32
Coming in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjects
☐ β˜† βœ‡ WeLiveSecurity

Everything you need to know about IP grabbers

February 22nd 2024 at 10:30
Unsuspecting users beware, IP grabbers do not ask for your permission.
☐ β˜† βœ‡ WeLiveSecurity

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

February 21st 2024 at 05:00
A mix of PSYOPs, espionage and … fake Canadian pharmacies!
☐ β˜† βœ‡ WeLiveSecurity

Watching out for the fakes: How to spot online disinformation

February 20th 2024 at 10:30
Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes?
☐ β˜† βœ‡ WeLiveSecurity

Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe

February 16th 2024 at 14:05
Here's how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals
☐ β˜† βœ‡ WeLiveSecurity

What is AI, really? | Unlocked 403: Cybersecurity podcast

February 15th 2024 at 15:32
Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack AI's basics, applications and broader implications.
☐ β˜† βœ‡ WeLiveSecurity

The art of digital sleuthing: How digital forensics unlocks the truth

February 14th 2024 at 10:30
Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell
☐ β˜† βœ‡ WeLiveSecurity

Deepfakes in the global election year of 2024: A weapon of mass deception?

February 13th 2024 at 10:30
As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern
☐ β˜† βœ‡ WeLiveSecurity

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

February 9th 2024 at 13:46
Called a "watershed year for ransomware", 2023 marked a reversal from the decline in ransomware payments observed in the previous year
☐ β˜† βœ‡ WeLiveSecurity

The buck stops here: Why the stakes are high for CISOs

February 8th 2024 at 10:30
Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?
☐ β˜† βœ‡ WeLiveSecurity

Left to their own devices: Security for employees using personal devices for work

February 6th 2024 at 10:30
As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it
❌