Category: welivesecurity

What are brushing scams and how do I stay safe?
24
Dec
2025

What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been…

A critical flaw in Windows Imaging Component
23
Dec
2025

A critical flaw in Windows Imaging Component

ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted…

ESET Threat Report H2 2025
17
Dec
2025

ESET Threat Report H2 2025

A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat…

Was that device designed to be on the internet at all?
13
Dec
2025

Was that device designed to be on the internet at all?

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found 12 Dec 2025…

What Schrödinger can teach us about cybersecurity
12
Dec
2025

What Schrödinger can teach us about cybersecurity

I recently had, what I thought, was a unique brainwave. (Spoiler alert: it wasn’t, but please read on!) As a…

Reputation is currency – even in the ransomware economy
12
Dec
2025

Reputation is currency – even in the ransomware economy

Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their…

How to harness today’s diverse analyst and tester landscape to paint a security masterpiece
11
Dec
2025

How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience….

Phil Muncaster
10
Dec
2025

How whaling attacks target top executives

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe. 09 Dec 2025  •  ,…

Why identity is critical to improving cybersecurity posture
05
Dec
2025

Why identity is critical to improving cybersecurity posture

Identity is effectively the new network boundary. It must be protected at all costs. 04 Dec 2025  •  , 4…

What’s at stake if your employees post too much online
02
Dec
2025

What’s at stake if your employees post too much online

From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also…

This month in security with Tony Anscombe – November 2025 edition
29
Nov
2025

This month in security with Tony Anscombe – November 2025 edition

Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this…

What parents should know to protect their children from doxxing
28
Nov
2025

What parents should know to protect their children from doxxing

Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake. 27 Nov…