Category: welivesecurity

The hidden risks of browser extensions – and how to avoid them
30
Jul
2025

The hidden risks of browser extensions – and how to avoid them

Not all browser add-ons are handy helpers – some may contain far more than you have bargained for 29 Jul…

ToolShell attacks hit organizations worldwide
26
Jul
2025

ToolShell attacks hit organizations worldwide

The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of…

Look out for phony verification pages spreading malware
25
Jul
2025

Look out for phony verification pages spreading malware

Before rushing to prove that you’re not a robot, be wary of deceptive human verification pages as an increasingly popular…

An all-you-can-eat buffet for threat actors
25
Jul
2025

An all-you-can-eat buffet for threat actors

ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities 24 Jul 2025  •  , 5 min….

Why is your data worth so much?
23
Jul
2025

Why is your data worth so much?

Behind every free online service, there’s a price being paid. Learn why your digital footprint is so valuable, and why…

Why you should never pay to get paid
05
Jul
2025

Why you should never pay to get paid

Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played…

How to get into cybersecurity
05
Jul
2025

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from ESET’s Robert Lipovsky as he reveals how to…

How government cyber cuts will affect you and your business
04
Jul
2025

How government cyber cuts will affect you and your business

Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling…

Cranking out spearphishing campaigns against Ukraine with an evolved toolset
03
Jul
2025

Cranking out spearphishing campaigns against Ukraine with an evolved toolset

ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024 02 Jul 2025…

Malware sharing, data wiping and exploits
02
Jul
2025

Malware sharing, data wiping and exploits

ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from…

Editor
02
Jul
2025

ESET Threat Report H1 2025: Key findings

ESET Chief Security Evangelist Tony Anscombe reviews some of the report’s standout findings and their implications for organizations in 2025…

Editor
29
Jun
2025

This month in security with Tony Anscombe – June 2025 edition

From Australia’s new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity…