Category: welivesecurity
The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it…
In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors 27 Aug 2024 • ,…
The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become 28…
Sometimes there’s more than just an enticing product offer hiding behind an ad 03 Sep 2024 • , 3 min….
Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the…
ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver 05 Sep 2024 • …
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as…
Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for…
ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own…
Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one 16…
ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing…
Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step…






