Category: welivesecurity

Is it time for internet services to adopt identity verification?
15
Jan
2026

Is it time for internet services to adopt identity verification?

Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters. 14 Jan…

Your information is on the dark web. What happens next?
14
Jan
2026

Your information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud…

What it is and how to protect yourself
09
Jan
2026

What it is and how to protect yourself

Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts 08…

This month in security with Tony Anscombe – December 2025 edition
30
Dec
2025

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and…

What are brushing scams and how do I stay safe?
24
Dec
2025

What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been…

A critical flaw in Windows Imaging Component
23
Dec
2025

A critical flaw in Windows Imaging Component

ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted…

ESET Threat Report H2 2025
17
Dec
2025

ESET Threat Report H2 2025

A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat…

Was that device designed to be on the internet at all?
13
Dec
2025

Was that device designed to be on the internet at all?

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found 12 Dec 2025…

What Schrödinger can teach us about cybersecurity
12
Dec
2025

What Schrödinger can teach us about cybersecurity

I recently had, what I thought, was a unique brainwave. (Spoiler alert: it wasn’t, but please read on!) As a…

Reputation is currency – even in the ransomware economy
12
Dec
2025

Reputation is currency – even in the ransomware economy

Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their…

How to harness today’s diverse analyst and tester landscape to paint a security masterpiece
11
Dec
2025

How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience….

Phil Muncaster
10
Dec
2025

How whaling attacks target top executives

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe. 09 Dec 2025  •  ,…