Category: welivesecurity

Phil Muncaster
04
Nov
2025

Strengthening cyber-defenses amid surging threats

Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks…

04
Nov
2025

Beware of threats lurking in booby-trapped PDF files

Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and…

Why successful businesses are built on protection
04
Nov
2025

Why successful businesses are built on protection

Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center…

Passwords alone are not enough
04
Nov
2025

Passwords alone are not enough

Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to…

How Uber seems to know where you are – even with restricted location permissions
04
Nov
2025

How Uber seems to know where you are – even with restricted location permissions

Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way. 09…

How chatbots can help spread scams
04
Nov
2025

How chatbots can help spread scams

Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what…

Why software patching matters more than ever
04
Nov
2025

Why software patching matters more than ever

As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly. 14…

The security blind spot that may put your business at risk
04
Nov
2025

The security blind spot that may put your business at risk

Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can…

When ‘hacking’ your game becomes a security risk
04
Nov
2025

When ‘hacking’ your game becomes a security risk

Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod….

Cybersecurity Awareness Month 2025: Building resilience against ransomware
04
Nov
2025

Cybersecurity Awareness Month 2025: Building resilience against ransomware

Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself…

How it preys on personal data – and how to stay safe
04
Nov
2025

How it preys on personal data – and how to stay safe

Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops…

Cyber risk thrives in the shadows
04
Nov
2025

Cyber risk thrives in the shadows

Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures 24 Oct 2025…