Category: welivesecurity
Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices 01 Oct 2024…
Building efficient recovery options will drive ecosystem resilience 01 Oct 2024 • , 4 min. read Last week, a US…
Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this…
Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility? 08…
ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental…
Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details 15 Oct…
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a…
The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from…
Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone…
Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various…
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the…
You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take…



