Category: welivesecurity

Exploring Android threats and ways to mitigate them
28
Mar
2025

Exploring Android threats and ways to mitigate them

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukáš demonstrate how easy it…

The risks of unsupported IoT tech
28
Mar
2025

The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors 27 Aug 2024  •  ,…

Editor
28
Mar
2025

Stealing cash using NFC relay – Week in Security with Tony Anscombe

The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become 28…

Malicious ads hiding in search results
28
Mar
2025

Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad 03 Sep 2024  •  , 3 min….

The key considerations for cyber insurance: A pragmatic approach
28
Mar
2025

The key considerations for cyber insurance: A pragmatic approach

Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some of the…

ESET Research Podcast: HotPage
28
Mar
2025

ESET Research Podcast: HotPage

ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver 05 Sep 2024  • …

Editor
28
Mar
2025

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as…

Phil Muncaster
28
Mar
2025

6 common Geek Squad scams and how to defend against them

Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for…

Editor
28
Mar
2025

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own…

AI security bubble already springing leaks
28
Mar
2025

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one 16…

ESET Research
28
Mar
2025

ESET Research Podcast: EvilVideo

ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing…

Understanding cyber-incident disclosure
28
Mar
2025

Understanding cyber-incident disclosure

Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step…