Category: welivesecurity

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2 2024–Q3 2024: Key…

ESET Research Podcast: Gamaredon

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation This article has been indexed from WeLiveSecurity Read the original article: ESET…

Beyond the checkbox: Demystifying cybersecurity compliance

In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business This article has been indexed from WeLiveSecurity Read the original…

Beats by bot: The AI remix revolution

Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the future of sound This article has been indexed from WeLiveSecurity Read the original article: Beats by bot: The AI remix…

Jane Goodall: Reasons for hope | Starmus highlights

The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity This article has been indexed from WeLiveSecurity Read the original…

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories This article has been indexed from WeLiveSecurity Read the original article: Month in security with Tony…

Tony Fadell: Innovating to save our planet | Starmus highlights

As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts This article has been indexed from WeLiveSecurity Read the original article: Tony Fadell: Innovating…

ESET Research Podcast: CosmicBeetle

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: CosmicBeetle

Understanding cyber-incident disclosure

Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help This article has been indexed from WeLiveSecurity Read the original article: Understanding cyber-incident disclosure

ESET Research Podcast: HotPage

ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: HotPage

The great location leak: Privacy risks in dating apps

Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance This article has been indexed from WeLiveSecurity Read the original article: The great location leak:…

Black Hat USA 2024: All eyes on election security

In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024: All eyes on election security

Why tech-savvy leadership is key to cyber insurance readiness

Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage This article has been indexed from WeLiveSecurity Read the original article: Why tech-savvy leadership is key to cyber insurance readiness

The complexities of cybersecurity update processes

If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike This article has been indexed from WeLiveSecurity Read the original article: The…

My health information has been stolen. Now what?

As health data continues to be a prized target for hackers, here’s how to minimize the fallout from a breach impacting your own health records This article has been indexed from WeLiveSecurity Read the original article: My health information has…

ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024

The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023 This article has been indexed from WeLiveSecurity Read the original article:…

Arid Viper poisons Android apps with AridSpy

ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine This article has been indexed from WeLiveSecurity Read the original article: Arid Viper poisons Android apps with AridSpy

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The award is an excellent opportunity for us to thank our readers and to recognize the depth of talent of ESET’s security researchers and writers This article has been indexed from WeLiveSecurity Read the original article: WeLiveSecurity wins Best Cybersecurity…

What happens when AI goes rogue (and how to stop it)

As AI gets closer to the ability to cause physical harm and impact the real world, “it’s complicated” is no longer a satisfying response This article has been indexed from WeLiveSecurity Read the original article: What happens when AI goes…

ESET APT Activity Report Q4 2023–Q1 2024

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q4 2023–Q1 2024

RSA Conference 2024: AI hype overload

Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations. This article has been indexed from WeLiveSecurity Read the original article: RSA Conference 2024: AI hype…

RSAC 2024: AI hype overload

Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations. This article has been indexed from WeLiveSecurity Read the original article: RSAC 2024: AI hype overload

Adding insult to injury: crypto recovery scams

Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over This article has been indexed from WeLiveSecurity…

How to share sensitive files securely online

Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe This article has been indexed from WeLiveSecurity Read the original article: How to share sensitive files…

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk This article has been indexed from WeLiveSecurity Read the original article: Vulnerabilities in business…

All eyes on AI | Unlocked 403: A cybersecurity podcast

Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack the basics and examine AI’s broader implications. This article has been indexed from WeLiveSecurity Read the original…

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: ChatGPT, the MOVEit…