(auto updated daily)
- Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year
- Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe
- Cyber insurance as part of the cyber threat mitigation strategy
- The long-tail costs of a data breach – Week in security with Tony Anscombe
- Buying a VPN? Here’s what to know and look for
- ESET Threat Report H1 2024
- My health information has been stolen. Now what?
- Hacktivism is evolving – and that could be bad news for organizations everywhere
- How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe
- Preventative defense tactics in the real world
- ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024
- Arid Viper poisons Android apps with AridSpy
- WeLiveSecurity wins Best Cybersecurity Vendor Blog award!
- 560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe
- The job hunter’s guide: Separating genuine offers from scams
- What happens when facial recognition gets it wrong – Week in security with Tony Anscombe
- The murky world of password leaks – and how to check if you’ve been hit
- AI in HR: Is artificial intelligence changing how we hire employees forever?
- ESET World 2024: Big on prevention, even bigger on AI
- Mandatory reporting of ransomware attacks? – Week in security with Tony Anscombe
- Beyond the buzz: Understanding AI and its role in cybersecurity
- Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries
- What happens when AI goes rogue (and how to stop it)
- The who, where, and how of APT attacks – Week in security with Tony Anscombe
- Untangling the hiring dilemma: How security solutions free up HR processes
- ESET APT Activity Report Q4 2023–Q1 2024
- How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe
- In it to win it! WeLiveSecurity shortlisted for European Cybersecurity Blogger Awards
- It's a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe
- RSA Conference 2024: AI hype overload
- To the Moon and back(doors): Lunar landing in diplomatic missions
- Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain
- Inspiring the next generation of scientists | Unlocked 403: Cybersecurity podcast
- Pay up, or else? – Week in security with Tony Anscombe
- Adding insult to injury: crypto recovery scams
- How space exploration benefits life on Earth: An interview with David Eicher
- Major phishing-as-a-service platform disrupted – Week in security with Tony Anscombe
- MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
- The hacker’s toolkit: 4 gadgets that could spell security trouble
- What makes Starmus unique? Q&A with award-winning filmmaker Todd Miller
- How technology drives progress: Q&A with Nobel laureate Michel Mayor
- The vision behind Starmus: Q&A with the festival’s co-founder Garik Israelian
- Protecting yourself after a medical data breach – Week in security with Tony Anscombe
- The many faces of impersonation fraud: Spot an imposter before it’s too late
- The ABCs of how online ads can impact children’s well-being
- eXotic Visit includes XploitSPY malware – Week in security with Tony Anscombe
- Bitcoin scams, hacks and heists – and how to avoid them
- Beyond fun and games: Exploring privacy risks in children’s apps
- The devil is in the fine print – Week in security with Tony Anscombe
- Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals
- RDP remains a security concern – Week in security with Tony Anscombe
- How often should you change your passwords?
- Malware hiding in pictures? More likely than you think
- AceCryptor attacks surge in Europe – Week in security with Tony Anscombe
- Borrower beware: Common loan scams and how to avoid them
- Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world
- Cybersecurity starts at home: Help your children stay safe online with open conversations
- A prescription for privacy protection: Exercise caution when using a mobile health app
- Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe
- Threat intelligence explained | Unlocked 403: Cybersecurity podcast
- Rescoms rides waves of AceCryptor spam
- How to share sensitive files securely online
- APT attacks taking aim at Tibetans – Week in security with Tony Anscombe
- Election cybersecurity: Protecting the ballot box and building trust in election integrity
- Top 10 scams targeting seniors – and how to keep your money safe
- Irresistible: Hooks, habits and why you can’t put down your phone
- Deceptive AI content and 2024 elections – Week in security with Tony Anscombe
- Evasive Panda leverages Monlam Festival to target Tibetans
- eXotic Visit campaign: Tracing the footprints of Virtual Invaders
- Vulnerabilities in business VPNs under the spotlight
- PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombe
- 10 things to avoid posting on social media – and why
- Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe
- What is AI, really? | Unlocked 403: Cybersecurity podcast
- Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
- Everything you need to know about IP grabbers
- Watching out for the fakes: How to spot online disinformation
- Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe
- Deepfakes in the global election year of 2024: A weapon of mass deception?
- 7 reasons why cybercriminals want your personal data
- Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses
- Grandoreiro banking malware disrupted – Week in security with Tony Anscombe
- The buck stops here: Why the stakes are high for CISOs
- Could your Valentine be a scammer? How to avoid getting caught in a bad romance
- ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora
- ESET takes part in global operation to disrupt the Grandoreiro banking trojan
- Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe
- Cyber: The Swiss army knife of tradecraft
- VajraSpy: A Patchwork of espionage apps
- Assessing and mitigating supply chain cybersecurity risks
- Why many CISOs consider quitting – Week in security with Tony Anscombe
- Break the fake: The race is on to stop AI voice cloning scams
- NSPX30: A sophisticated AitM-enabled implant evolving since 2005
- Virtual kidnapping: How to see through this terrifying scam
- Is Temu safe? What to know before you ‘shop like a billionaire’
- The 7 deadly cloud security sins – and how SMBs can do things better
- Lessons from SEC's X account hack – Week in security with Tony Anscombe
- Attack of the copycats: How fake messaging apps and app mods could bite you
- Love is in the AI: Finding love online takes on a whole new meaning
- Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe
- Lost and found: How to locate your missing devices and more
Leave a comment