Category: welivesecurity

ESET Research
28
Mar
2025

ESET Research Podcast: EvilVideo

ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing…

Understanding cyber-incident disclosure
28
Mar
2025

Understanding cyber-incident disclosure

Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step…

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)
28
Mar
2025

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company’s success? We…

Editor
28
Mar
2025

False claims of hacked voter data – Week in security with Tony Anscombe

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to…

How parents can help keep their children safe on Snapchat
28
Mar
2025

How parents can help keep their children safe on Snapchat

Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay…

Phil Muncaster
28
Mar
2025

Don’t panic and other tips for staying safe from scareware

Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics 25…

Analysis of toolset used to spy on Ukraine in 2022 and 2023
28
Mar
2025

Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine…

Editor
28
Mar
2025

Gamaredon’s operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group’s malicious wares as used to spy on targets in Ukraine in the past two years…

Tony Anscombe
28
Mar
2025

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices 01 Oct 2024…

Why system resilience should mainly be the job of the OS, not just third-party applications
28
Mar
2025

Why system resilience should mainly be the job of the OS, not just third-party applications

Building efficient recovery options will drive ecosystem resilience 01 Oct 2024  •  , 4 min. read Last week, a US…

Editor
28
Mar
2025

The complexities of cyberattack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this…

Tony Anscombe
28
Mar
2025

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility? 08…