Category: welivesecurity

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)
28
Mar
2025

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company’s success? We…

Editor
28
Mar
2025

False claims of hacked voter data – Week in security with Tony Anscombe

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to…

How parents can help keep their children safe on Snapchat
28
Mar
2025

How parents can help keep their children safe on Snapchat

Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay…

Phil Muncaster
28
Mar
2025

Don’t panic and other tips for staying safe from scareware

Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics 25…

Analysis of toolset used to spy on Ukraine in 2022 and 2023
28
Mar
2025

Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine…

Editor
28
Mar
2025

Gamaredon’s operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group’s malicious wares as used to spy on targets in Ukraine in the past two years…

Tony Anscombe
28
Mar
2025

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices 01 Oct 2024…

Why system resilience should mainly be the job of the OS, not just third-party applications
28
Mar
2025

Why system resilience should mainly be the job of the OS, not just third-party applications

Building efficient recovery options will drive ecosystem resilience 01 Oct 2024  •  , 4 min. read Last week, a US…

Editor
28
Mar
2025

The complexities of cyberattack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this…

Tony Anscombe
28
Mar
2025

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility? 08…

Editor
28
Mar
2025

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental…

Here’s how to slam on the brakes
28
Mar
2025

Here’s how to slam on the brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details 15 Oct…