Category: welivesecurity
Have you ever received a package you never ordered? It could be a warning sign that your data has been…
ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted…
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat…
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found 12 Dec 2025…
I recently had, what I thought, was a unique brainwave. (Spoiler alert: it wasn’t, but please read on!) As a…
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their…
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience….
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe. 09 Dec 2025 • ,…
Identity is effectively the new network boundary. It must be protected at all costs. 04 Dec 2025 • , 4…
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also…
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this…
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake. 27 Nov…