Category: welivesecurity
The group’s Operation AkaiRyū begins with targeted spearphishing emails that use the upcoming World Expo 2025 in Osaka, Japan, as…
Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first…
ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR…
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will…
Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search…
Business Security Ransomware Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage 31 Mar…
From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it’s a wrap on…
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how…
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to…
One of the terms I’m most often asked to explain is what a “zero day” vulnerability or exploit is; let’s…
Facebook has officially launched ThreatExchange – a collaborative social network where companies can share information on cybersecurity threats, in an…
With Valentine’s Day nearly upon us, millions will be looking for love online. Here’s six online dating scams to look…





