Category: welivesecurity
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as…
Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for…
ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own…
Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one 16…
ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing…
Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step…
How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company’s success? We…
With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to…
Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay…
Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics 25…
ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine…
ESET research examines the group’s malicious wares as used to spy on targets in Ukraine in the past two years…




