Category: welivesecurity

ESET APT Activity Report Q2 2025–Q3 2025
07
Nov
2025

ESET APT Activity Report Q2 2025–Q3 2025

ESET Research Threat Reports An overview of the activities of selected APT groups investigated and analyzed by ESET Research in…

The WhatsApp screen-sharing scam you didn’t see coming
06
Nov
2025

The WhatsApp screen-sharing scam you didn’t see coming

How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data 05 Nov 2025…

How social engineering really works
05
Nov
2025

How social engineering really works

Think you could never fall for an online scam? Think again. Here’s how scammers could exploit psychology to deceive you…

Camilo Gutiérrez Amaya
04
Nov
2025

Watch out for SVG files booby-trapped with malware

What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy…

Christian Ali Bravo
04
Nov
2025

It’s all fun and games until someone gets hacked

You could be getting more than you bargained for when you download that cheat tool promising quick wins 26 Sep…

04
Nov
2025

It’s all fun and games until someone gets hacked

You could be getting more than you bargained for when you download that cheat tool promising quick wins 26 Sep…

Editor
04
Nov
2025

This month in security with Tony Anscombe – September 2025 edition

The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need…

Editor
04
Nov
2025

Cybersecurity Awareness Month 2025: Knowledge is power

We’re kicking off the month with a focus on the human element: the first line of defense, but also the…

Phil Muncaster
04
Nov
2025

Strengthening cyber-defenses amid surging threats

Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks…

04
Nov
2025

Beware of threats lurking in booby-trapped PDF files

Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and…

Why successful businesses are built on protection
04
Nov
2025

Why successful businesses are built on protection

Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center…

Passwords alone are not enough
04
Nov
2025

Passwords alone are not enough

Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to…