FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WeLiveSecurity

Under lock and key: Safeguarding business data with encryption

β€” September 5th 2025 at 08:53
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
☐ β˜† βœ‡ WeLiveSecurity

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

β€” September 4th 2025 at 08:55
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – August 2025 edition

β€” August 28th 2025 at 09:00
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Don’t let β€œback to school” become β€œback to (cyber)bullying”

β€” August 27th 2025 at 09:00
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
☐ β˜† βœ‡ WeLiveSecurity

First known AI-powered ransomware uncovered by ESET Research

β€” August 26th 2025 at 23:12
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
☐ β˜† βœ‡ WeLiveSecurity

"What happens online stays online" and other cyberbullying myths, debunked

β€” August 21st 2025 at 09:00
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
☐ β˜† βœ‡ WeLiveSecurity

The need for speed: Why organizations are turning to rapid, trustworthy MDR

β€” August 19th 2025 at 09:00
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
☐ β˜† βœ‡ WeLiveSecurity

Investors beware: AI-powered financial scams swamp social media

β€” August 18th 2025 at 09:00
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
☐ β˜† βœ‡ WeLiveSecurity

Supply-chain dependencies: Check your resilience blind spot

β€” August 12th 2025 at 14:08
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
☐ β˜† βœ‡ WeLiveSecurity

How the always-on generation can level up its cybersecurity game

β€” August 12th 2025 at 09:00
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
☐ β˜† βœ‡ WeLiveSecurity

WinRAR zero-day exploited in espionage attacks against high-value targets

β€” August 11th 2025 at 18:18
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
☐ β˜† βœ‡ WeLiveSecurity

Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability

β€” August 11th 2025 at 09:00
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
☐ β˜† βœ‡ WeLiveSecurity

Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?

β€” August 8th 2025 at 14:25
A sky-high premium may not always reflect your company’s security posture
☐ β˜† βœ‡ WeLiveSecurity

Android adware: What is it, and how do I get it off my device?

β€” August 8th 2025 at 09:00
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
☐ β˜† βœ‡ WeLiveSecurity

Black Hat USA 2025: Policy compliance and the myth of the silver bullet

β€” August 7th 2025 at 16:03
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
☐ β˜† βœ‡ WeLiveSecurity

Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

β€” August 7th 2025 at 14:23
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch

β€” August 5th 2025 at 09:00
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
☐ β˜† βœ‡ WeLiveSecurity

Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)

β€” August 1st 2025 at 12:08
Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
☐ β˜† βœ‡ WeLiveSecurity

Why the tech industry needs to stand firm on preserving end-to-end encryption

β€” August 1st 2025 at 09:00
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – July 2025 edition

β€” July 31st 2025 at 07:43
Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
☐ β˜† βœ‡ WeLiveSecurity

The hidden risks of browser extensions – and how to stay safe

β€” July 29th 2025 at 09:00
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
☐ β˜† βœ‡ WeLiveSecurity

SharePoint under fire: ToolShell attacks hit organizations worldwide

β€” July 25th 2025 at 07:28
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
☐ β˜† βœ‡ WeLiveSecurity

ToolShell: An all-you-can-eat buffet for threat actors

β€” July 24th 2025 at 09:00
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities
☐ β˜† βœ‡ WeLiveSecurity

Rogue CAPTCHAs: Look out for phony verification pages spreading malware

β€” July 24th 2025 at 08:30
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
☐ β˜† βœ‡ WeLiveSecurity

Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4)

β€” July 22nd 2025 at 10:18
Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product.
☐ β˜† βœ‡ WeLiveSecurity

Unmasking AsyncRAT: Navigating the labyrinth of forks

β€” July 15th 2025 at 08:59
ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants
☐ β˜† βœ‡ WeLiveSecurity

How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)

β€” July 4th 2025 at 09:40
Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.
☐ β˜† βœ‡ WeLiveSecurity

Task scams: Why you should never pay to get paid

β€” July 4th 2025 at 09:00
Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.
☐ β˜† βœ‡ WeLiveSecurity

How government cyber cuts will affect you and your business

β€” July 3rd 2025 at 09:00
Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks
☐ β˜† βœ‡ WeLiveSecurity

Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset

β€” July 2nd 2025 at 08:58
ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report H1 2025: Key findings

β€” July 1st 2025 at 11:51
ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits

β€” July 1st 2025 at 09:00
ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – June 2025 edition

β€” June 28th 2025 at 07:52
From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report H1 2025

β€” June 26th 2025 at 09:38
A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
☐ β˜† βœ‡ WeLiveSecurity

BladedFeline: Whispering in the dark

β€” June 5th 2025 at 09:00
ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig
☐ β˜† βœ‡ WeLiveSecurity

Don’t let dormant accounts become a doorway for cybercriminals

β€” June 2nd 2025 at 09:00
Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – May 2025 edition

β€” May 30th 2025 at 09:00
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Word to the wise: Beware of fake Docusign emails

β€” May 27th 2025 at 09:00
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data
☐ β˜† βœ‡ WeLiveSecurity

Danabot under the microscope

β€” May 23rd 2025 at 11:43
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure
☐ β˜† βœ‡ WeLiveSecurity

Danabot: Analyzing a fallen empire

β€” May 22nd 2025 at 20:03
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation
☐ β˜† βœ‡ WeLiveSecurity

Lumma Stealer: Down for the count

β€” May 22nd 2025 at 14:53
The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies
☐ β˜† βœ‡ WeLiveSecurity

ESET takes part in global operation to disrupt Lumma Stealer

β€” May 21st 2025 at 16:15
Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation
☐ β˜† βœ‡ WeLiveSecurity

The who, where, and how of APT attacks in Q4 2024–Q1 2025

β€” May 19th 2025 at 17:17
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q4 2024–Q1 2025

β€” May 19th 2025 at 08:55
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025
☐ β˜† βœ‡ WeLiveSecurity

Sednit abuses XSS flaws to hit gov't entities, defense companies

β€” May 15th 2025 at 13:15
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU
☐ β˜† βœ‡ WeLiveSecurity

Operation RoundPress

β€” May 15th 2025 at 07:22
ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities
☐ β˜† βœ‡ WeLiveSecurity

How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)

β€” May 12th 2025 at 09:00
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.
☐ β˜† βœ‡ WeLiveSecurity

Catching a phish with many faces

β€” May 9th 2025 at 09:00
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly
☐ β˜† βœ‡ WeLiveSecurity

Beware of phone scams demanding money for β€˜missed jury duty’

β€” May 7th 2025 at 09:00
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer.
☐ β˜† βœ‡ WeLiveSecurity

Toll road scams are in overdrive: Here’s how to protect yourself

β€” May 6th 2025 at 09:00
Have you received a text message about an unpaid road toll? Make sure you’re not the next victim of a smishing scam.
☐ β˜† βœ‡ WeLiveSecurity

RSAC 2025 wrap-up – Week in security with Tony Anscombe

β€” May 2nd 2025 at 14:16
From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions
☐ β˜† βœ‡ WeLiveSecurity

TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks

β€” April 30th 2025 at 09:00
ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – April 2025 edition

β€” April 29th 2025 at 11:43
From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity
☐ β˜† βœ‡ WeLiveSecurity

How safe and secure is your iPhone really?

β€” April 28th 2025 at 09:47
Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
☐ β˜† βœ‡ WeLiveSecurity

Deepfake 'doctors' take to TikTok to peddle bogus cures

β€” April 25th 2025 at 09:00
Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements
☐ β˜† βœ‡ WeLiveSecurity

How fraudsters abuse Google Forms to spread scams

β€” April 23rd 2025 at 09:00
The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.
☐ β˜† βœ‡ WeLiveSecurity

Will super-smart AI be attacking us anytime soon?

β€” April 22nd 2025 at 09:00
What practical AI attacks exist today? β€œMore than zero” is the answer – and they’re getting better.
☐ β˜† βœ‡ WeLiveSecurity

CapCut copycats are on the prowl

β€” April 17th 2025 at 09:00
Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to attempt to steal their data or hijack their devices instead
☐ β˜† βœ‡ WeLiveSecurity

They’re coming for your data: What are infostealers and how do I stay safe?

β€” April 16th 2025 at 09:00
Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest for your sensitive data
☐ β˜† βœ‡ WeLiveSecurity

Attacks on the education sector are surging: How can cyber-defenders respond?

β€” April 14th 2025 at 09:00
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?
❌