Category: welivesecurity

How to remove your personal information from Google Search results
27
Mar
2025

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your…

Editor
27
Mar
2025

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of…

Jane Goodall: Reasons for hope
27
Mar
2025

Jane Goodall: Reasons for hope

The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly…

ESET APT Activity Report Q2 2024–Q3 2024
27
Mar
2025

ESET APT Activity Report Q2 2024–Q3 2024

ESET Research Threat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in…

Beyond the checkbox: Demystifying cybersecurity compliance
27
Mar
2025

Beyond the checkbox: Demystifying cybersecurity compliance

What is the most common pain point facing businesses these days? Is it supply chain fragility? Fierce competition? Tight cashflows?…

Imogen Byers
27
Mar
2025

Beats by bot: The AI remix revolution

Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the…

ESET Research Podcast: Gamaredon
27
Mar
2025

ESET Research Podcast: Gamaredon

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and…

ESET APT Activity Report Q2 2024–Q3 2024: Key findings
27
Mar
2025

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity…

What is “Scam Likely”? Putting the phone down on unwanted calls
27
Mar
2025

What is “Scam Likely”? Putting the phone down on unwanted calls

Tired of dodging all those ‘Scam Likely’ calls? Here’s what’s behind the label and how to stay one step ahead…

My information was stolen. Now what?
27
Mar
2025

My information was stolen. Now what?

Back in May 2023, I wrote the blogpost You may not care where you download software from, but malware does…

Editor
27
Mar
2025

Kathryn Thornton: First Service Mission to the Hubble Space Telescope

The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork…

Editor
27
Mar
2025

Zero-click exploit abusing Firefox and Windows zero days

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds 26 Nov…