Category: welivesecurity
ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance…
As the mercury starts to dip and the Halloween decorations are cleared away, it can mean only one thing: the…
Zero days under attack, a new advisory from ‘Five Eyes’, thousands of ICS units left exposed, and mandatory MFA for…
ESET’s CEO unpacks the complexities of cybersecurity in today’s hyper-connected world and highlights the power of innovation in stopping digital…
Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on…
We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the…
Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of…
As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization’s security strategy keep pace with today’s…
Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? 12 Dec…
Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific…
Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy…
ESET Research Threat Reports A view of the H2 2024 threat landscape as seen by ESET telemetry and from the…








