Category: welivesecurity

Martin Rees: Post-human intelligence – a cosmic perspective
10
Apr
2025

Martin Rees: Post-human intelligence – a cosmic perspective

Take a moment to think beyond our current capabilities and consider what might come next in the grand story of…

Kids behaving badly online? Here’s how parents can help
10
Apr
2025

Kids behaving badly online? Here’s how parents can help

By taking time to understand and communicate the impact of undesirable online behavior, you can teach your kids an invaluable…

A new face of corporate fraud
10
Apr
2025

A new face of corporate fraud

Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses 10 Mar 2025  •  ,…

spotify-phishing
10
Apr
2025

Don’t let cybercriminals steal your Spotify account

Spotify boasts almost 700 million active users, including 265 million premium subscribers. As the world’s leading music streaming service, it’s…

Cybersecurity for the physical world
10
Apr
2025

Cybersecurity for the physical world

While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT…

AI's biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1)
10
Apr
2025

AI’s biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1)

Here’s what’s been hot on the AI scene over the past 12 months, how it’s changing the face of warfare,…

Editor
10
Apr
2025

MirrorFace updates toolset, expands reach to Europe

The group’s Operation AkaiRyū begins with targeted spearphishing emails that use the upcoming World Expo 2025 in Osaka, Japan, as…

FamousSparrow resurfaces to spy on targets in the US, Latin America
10
Apr
2025

FamousSparrow resurfaces to spy on targets in the US, Latin America

Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first…

Editor
10
Apr
2025

RansomHub affiliates linked to rival RaaS providers

ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR…

How to get the most out of cybersecurity training
10
Apr
2025

How to get the most out of cybersecurity training

Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will…

Tomáš Foltýn
10
Apr
2025

Watch out for these traps lurking in search results

Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search…

A key to business survival
10
Apr
2025

A key to business survival

Business Security Ransomware Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage 31 Mar…