News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
4 | Follower
WeLiveSecurity
04.06.2025
Do you have dozens of forgotten, inactive accounts you can’t even locate anymore? A bit of digital spring cleaning might be in order.
01.06.2025
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news
29.05.2025
Cybercriminals are using fake Docusign-themed documents and links to trick people into giving away their personal or corporate data.
25.05.2025
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure.
24.05.2025
The bustling enterprise, recently disrupted by a global effort including ESET, is notorious for going after all manner of sensitive data, including passwords, credit card numbers, and cryptowallet info.
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation.
23.05.2025
Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation
21.05.2025
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest ESET APT Activity Report
This issue of the ESET APT Activity Report reviews notable activities of APT group that were documented by ESET researchers from October 2024 until March 2025.
17.05.2025
ESET researchers uncover a Russia-aligned espionage operation that they named RoundPress and that targets webmail servers via XSS vulnerabilities.
Operation RoundPress exploits security holes in webmail software to target Ukrainian governmental entities and defense companies in Eastern Europe.
14.05.2025
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation, one of the most pressing challenges facing our digital world.
10.05.2025
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly.
09.05.2025
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer.
08.05.2025
Have you received a text message about an unpaid road toll? You’re not alone. Make sure you’re not the next victim of a smishing scam.
04.05.2025
From the power of collaborative defense to identity security and AI, catch up on the event's key themes with ESET Chief Security Evangelist Tony Anscombe.
02.05.2025
ESET researchers publish an analysis of Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks.
30.04.2025
Your iPhone isn’t necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity
27.04.2025
Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements
25.04.2025
Google Forms, the form and quiz-building tool, is a popular vector for social engineering and malware. Here’s how to stay safe.
23.04.2025
From the time a CVE is released that’s exploitable, or a new technique rolled out, you’ll have to think quick – I hope you’re ready.
19.04.2025
Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to steal their data or hijack their devices instead.
18.04.2025
Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest for your sensitive data
16.04.2025
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?
11.04.2025
Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results.
10.04.2025
Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first time.
ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor, SparrowDoor.
Although relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT threat
The computer scientist and AI researcher Mária Bieliková shares her thoughts on the technologys potential and pitfalls – and what may lie ahead for us.
ESET Research is publishing its investigation of Operation FishMedley, a global espionage operation by the China-aligned APT group FishMonger.
Here's what's been hot on the AI scene over the past 12 months, how it's changing the face of warfare, and how you can fight AI-powered scams
From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it's a wrap on another month filled with impactful cybersecurity news
Listen up, this is sure to be music to your ears – a few minutes spent securing your account today can save you a ton of trouble tomorrow
ESET researchers discover new ties between affiliates of RansomHub and of rival gangs Medusa, BianLian, and Play.
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will kick in when actual danger looms.
When ransomware attempts to hold your critical data hostage, your company’s ability to anticipate the unexpected may become its ultimate competitive advantage.
ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR security solutions
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.