ESET’s Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging online fraud This article has been indexed from WeLiveSecurity Read the original article: Unwrapping Christmas scams…
Tag: welivesecurity
ESET Threat Report H2 2024: Key findings
ESET Chief Security Evangelist Tony Anscombe looks at some of the report’s standout findings and their implications for staying secure in 2025 This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H2 2024: Key findings
Black Hat Europe 2024: Why a CVSS score of 7.5 may be a ‘perfect’ 10 in your organization
Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems This article has been indexed from WeLiveSecurity Read…
Black Hat Europe 2024: Hacking a car – or rather, its infotainment system
Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2024: Hacking a…
Black Hat Europe 2024: Can AI systems be socially engineered?
Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2024: Can AI systems be socially engineered?
How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)
As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization’s security strategy keep pace with today’s rapidly evolving threats? This article has been indexed from WeLiveSecurity Read the original article: How cyber-secure is your business? |…
Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks
Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost This article has been indexed from WeLiveSecurity Read the original article: Are…
Philip Torr: AI to the people | Starmus Highlights
We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact This article has been indexed from WeLiveSecurity Read the original article: Philip Torr: AI to…
ESET APT Activity Report Q2 2024–Q3 2024: Key findings
ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2 2024–Q3 2024: Key…
ESET Research Podcast: Gamaredon
ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation This article has been indexed from WeLiveSecurity Read the original article: ESET…
Beyond the checkbox: Demystifying cybersecurity compliance
In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business This article has been indexed from WeLiveSecurity Read the original…
Beats by bot: The AI remix revolution
Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the future of sound This article has been indexed from WeLiveSecurity Read the original article: Beats by bot: The AI remix…
Jane Goodall: Reasons for hope | Starmus highlights
The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity This article has been indexed from WeLiveSecurity Read the original…
Month in security with Tony Anscombe – October 2024 edition
Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories This article has been indexed from WeLiveSecurity Read the original article: Month in security with Tony…
How to remove your personal information from Google Search results
Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results. This article has been indexed from WeLiveSecurity Read the original article: How to remove your…
Tony Fadell: Innovating to save our planet | Starmus highlights
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts This article has been indexed from WeLiveSecurity Read the original article: Tony Fadell: Innovating…
ESET Research Podcast: CosmicBeetle
Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: CosmicBeetle
Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe
The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year This article has been indexed from WeLiveSecurity Read the original…
Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online and even be the start of a predatory relationship This article has been indexed from WeLiveSecurity Read the…
GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe
ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities This article has been indexed from WeLiveSecurity Read the original article: GoldenJackal jumps the air gap ……
Cyber insurance, human risk, and the potential for cyber-ratings
Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility? This article has been indexed from WeLiveSecurity Read the original article: Cyber insurance, human risk, and the potential for cyber-ratings
The complexities of attack attribution – Week in security with Tony Anscombe
As highlighted by new ESET research this week, attributing a cyberattack to a specific threat actor is a complex affair This article has been indexed from WeLiveSecurity Read the original article: The complexities of attack attribution – Week in security…
Why system resilience should mainly be the job of the OS, not just third-party applications
Building efficient recovery options will drive ecosystem resilience This article has been indexed from WeLiveSecurity Read the original article: Why system resilience should mainly be the job of the OS, not just third-party applications
Gamaredon’s operations under the microscope – Week in security with Tony Anscombe
ESET research examines the group’s malicious wares as used to spy on targets in Ukraine in the past two years This article has been indexed from WeLiveSecurity Read the original article: Gamaredon’s operations under the microscope – Week in security…
Don’t panic and other tips for staying safe from scareware
Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics This article has been indexed from WeLiveSecurity Read the original article: Don’t panic and other tips for staying safe from scareware
FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe
With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process This article has been indexed from WeLiveSecurity Read the original article: FBI, CISA warning…
Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)
How do analyst relations professionals ‘sort through the noise’ and help deliver the not-so-secret sauce for a company’s success? We spoke with ESET’s expert to find out. This article has been indexed from WeLiveSecurity Read the original article: Influencing the…
Understanding cyber-incident disclosure
Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help This article has been indexed from WeLiveSecurity Read the original article: Understanding cyber-incident disclosure
CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe
ESET research also finds that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends This article has been indexed from WeLiveSecurity Read the original article: CosmicBeetle joins the ranks of RansomHub affiliates –…
6 common Geek Squad scams and how to defend against them
Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks This article has been indexed from WeLiveSecurity Read the original article: 6 common Geek Squad scams and how…
Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe
The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams This article has been indexed from WeLiveSecurity Read the original article: Bitcoin…
ESET Research Podcast: HotPage
ESET researchers discuss HotPage, a recently discovered adware armed with a highest-privilege, yet vulnerable, Microsoft-signed driver This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: HotPage
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Demystifying CVE-2024-7262 and CVE-2024-7263 This article has been indexed from WeLiveSecurity Read the original article: Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Stealing cash using NFC relay – Week in Security with Tony Anscombe
The discovery of the NGate malware by ESET Research is another example of how sophisticated Android threats have become This article has been indexed from WeLiveSecurity Read the original article: Stealing cash using NFC relay – Week in Security with…
PWA phishing on Android and iOS – Week in security with Tony Anscombe
Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security This article has been indexed from WeLiveSecurity Read the original article: PWA phishing on Android and iOS – Week in security with…
How regulatory standards and cyber insurance inform each other
Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with This article has been indexed from WeLiveSecurity Read the…
How a BEC scam cost a company $60 Million – Week in security with Tony Anscombe
Business email compromise (BEC) has once again proven to be a costly issue, with a company losing $60 million in a wire transfer fraud scheme This article has been indexed from WeLiveSecurity Read the original article: How a BEC scam…
The great location leak: Privacy risks in dating apps
Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance This article has been indexed from WeLiveSecurity Read the original article: The great location leak:…
Black Hat USA 2024: All eyes on election security
In this high-stakes year for democracy, the importance of robust election safeguards and national cybersecurity strategies cannot be understated This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024: All eyes on election security
Black Hat USA 2024 recap – Week in security with Tony Anscombe
Unsurprisingly, many discussions focused on the implications of the recent CrowdStrike outage, including the lessons it may have offered for bad actors This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024 recap – Week…
Black Hat USA 2024: How cyber insurance is shaping cybersecurity strategies
Cyber insurance is not only a safety net, but it can also be a catalyst for advancing security practices and standards This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2024: How cyber insurance is…
Why tech-savvy leadership is key to cyber insurance readiness
Having knowledgeable leaders at the helm is crucial for protecting the organization and securing the best possible cyber insurance coverage This article has been indexed from WeLiveSecurity Read the original article: Why tech-savvy leadership is key to cyber insurance readiness
AI and automation reducing breach costs – Week in security with Tony Anscombe
Organizations that leveraged AI and automation in security prevention cut the cost of a data breach by US$2.22 million compared to those that didn’t deploy these technologies, according to IBM This article has been indexed from WeLiveSecurity Read the original…
The cyberthreat that drives businesses towards cyber risk insurance
Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide This article has been indexed from WeLiveSecurity Read the original article:…
Telegram for Android hit by a zero-day exploit – Week in security with Tony Anscombe
Attackers abusing the “EvilVideo” vulnerability could share malicious Android payloads via Telegram channels, groups, and chats, all while making them appear as legitimate multimedia files This article has been indexed from WeLiveSecurity Read the original article: Telegram for Android hit…
Building cyber-resilience: Lessons learned from the CrowdStrike incident
Organizations, including those that weren’t struck by the CrowdStrike incident, should resist the temptation to attribute the IT meltdown to exceptional circumstances This article has been indexed from WeLiveSecurity Read the original article: Building cyber-resilience: Lessons learned from the CrowdStrike…
The complexities of cybersecurity update processes
If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike This article has been indexed from WeLiveSecurity Read the original article: The…
Beyond the blue screen of death: Why software updates matter
The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them. This article has been indexed from WeLiveSecurity Read the original article: Beyond the blue screen of death:…
Hello, is it me you’re looking for? How scammers get your phone number
Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters. This article has been indexed from…
Should ransomware payments be banned? – Week in security with Tony Anscombe
The issue of whether to ban ransomware payments is a hotly debated topic in cybersecurity and policy circles. What are the implications of outlawing these payments, and would the ban be effective? This article has been indexed from WeLiveSecurity Read…
Understanding IoT security risks and how to mitigate them | Cybersecurity podcast
As security challenges loom large on the IoT landscape, how can we effectively counter the risks of integrating our physical and digital worlds? This article has been indexed from WeLiveSecurity Read the original article: Understanding IoT security risks and how…
Social media and teen mental health – Week in security with Tony Anscombe
Social media sites are designed to make their users come back for more. Do laws restricting children’s exposure to addictive social media feeds have teeth or are they a political gimmick? This article has been indexed from WeLiveSecurity Read the…
Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe
Learn about the categories of threats that ‘topped the charts’ and the kinds of techniques that bad actors leveraged most commonly in the first half of this year. This article has been indexed from WeLiveSecurity Read the original article: Key…
Cyber insurance as part of the cyber threat mitigation strategy
Why organizations of every size and industry should explore their cyber insurance options as a crucial component of their risk mitigation strategies This article has been indexed from WeLiveSecurity Read the original article: Cyber insurance as part of the cyber…
The long-tail costs of a data breach – Week in security with Tony Anscombe
Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents This article has been indexed from WeLiveSecurity Read the original article: The long-tail costs of a…
My health information has been stolen. Now what?
As health data continues to be a prized target for hackers, here’s how to minimize the fallout from a breach impacting your own health records This article has been indexed from WeLiveSecurity Read the original article: My health information has…
Hacktivism is evolving – and that could be bad news for organizations everywhere
Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat This article has been indexed from WeLiveSecurity Read the original article: Hacktivism is evolving – and that could be…
ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024
The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023 This article has been indexed from WeLiveSecurity Read the original article:…
How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe
The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app This article has been indexed from WeLiveSecurity Read the original article: How Arid Viper…
Arid Viper poisons Android apps with AridSpy
ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine This article has been indexed from WeLiveSecurity Read the original article: Arid Viper poisons Android apps with AridSpy
WeLiveSecurity wins Best Cybersecurity Vendor Blog award!
The award is an excellent opportunity for us to thank our readers and to recognize the depth of talent of ESET’s security researchers and writers This article has been indexed from WeLiveSecurity Read the original article: WeLiveSecurity wins Best Cybersecurity…
560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe
Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data. Watch as Tony discusses the story and provides useful tips on how to protect people’s data. This article has…
The job hunter’s guide: Separating genuine offers from scams
$90,000/year, full home office, and 30 days of paid leave, and all for a job as a junior data analyst – unbelievable, right? This and many other job offers are fake though – made just to ensnare unsuspecting victims into…
What happens when facial recognition gets it wrong – Week in security with Tony Anscombe
A woman in London has been misidentified as a shoplifter by a facial recognition system amid fresh concerns over the technology’s accuracy and reliability This article has been indexed from WeLiveSecurity Read the original article: What happens when facial recognition…
AI in HR: Is artificial intelligence changing how we hire employees forever?
Much digital ink has been spilled on artificial intelligence taking over jobs, but what about AI shaking up the hiring process in the meantime? This article has been indexed from WeLiveSecurity Read the original article: AI in HR: Is artificial…
ESET World 2024: Big on prevention, even bigger on AI
What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference. This article has been indexed from…
Mandatory reporting for ransomware attacks? – Week in security with Tony Anscombe
As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond? This article has been indexed from WeLiveSecurity Read the original…
Introducing Nimfilt: A reverse-engineering tool for Nim-compiled binaries
Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings This article has been indexed from…
What happens when AI goes rogue (and how to stop it)
As AI gets closer to the ability to cause physical harm and impact the real world, “it’s complicated” is no longer a satisfying response This article has been indexed from WeLiveSecurity Read the original article: What happens when AI goes…
The who, where, and how of APT attacks – Week in security with Tony Anscombe
This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape This article has been indexed from WeLiveSecurity Read the original article: The who, where, and…
ESET APT Activity Report Q4 2023–Q1 2024
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2023 and Q1 2024 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q4 2023–Q1 2024
RSA Conference 2024: AI hype overload
Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations. This article has been indexed from WeLiveSecurity Read the original article: RSA Conference 2024: AI hype…
It’s a wrap! RSA Conference 2024 highlights – Week in security with Tony Anscombe
More than 40,000 security experts descended on San Francisco this week. Let’s now look back on some of the event’s highlights – including the CISA-led ‘Secure by Design’ pledge also signed by ESET. This article has been indexed from WeLiveSecurity…
In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards
We’re thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates – Best Cybersecurity Vendor Blog category of the European Security Blogger Awards 2024 This article has been indexed from WeLiveSecurity Read the original article: In it…
How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe
We spoke to climate scientist Katharine Hayhoe about intersections between climate action, human psychology and spirituality, and how to channel anxiety about the state of our planet into meaningful action This article has been indexed from WeLiveSecurity Read the original…
RSAC 2024: AI hype overload
Can AI effortlessly thwart all sorts of cyberattacks? Let’s cut through the hyperbole surrounding the tech and look at its actual strengths and limitations. This article has been indexed from WeLiveSecurity Read the original article: RSAC 2024: AI hype overload
How to inspire the next generation of scientists | Cybersecurity podcast
As Starmus Earth draws near, we caught up with Dr. Garik Israelian to venture into the dynamic intersection of science and art, where imagination flourishes and groundbreaking ideas take flight This article has been indexed from WeLiveSecurity Read the original…
How to inspire the next generation of scientists | Unlocked 403: Cybersecurity podcast
As Starmus Earth draws near, we caught up with Dr. Garik Israelian to celebrate the fusion of science and creativity and venture where imagination flourishes and groundbreaking ideas take flight This article has been indexed from WeLiveSecurity Read the original…
Pay up, or else? – Week in security with Tony Anscombe
Organizations that fall victim to a ransomware attack are often caught between a rock and a hard place, grappling with the dilemma of whether to pay up or not This article has been indexed from WeLiveSecurity Read the original article:…
Adding insult to injury: crypto recovery scams
Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over This article has been indexed from WeLiveSecurity…
How space exploration benefits life on Earth: Q&A with David Eicher
We spoke to Astronomy magazine editor-in-chief David Eicher about key challenges facing our planet, the importance of space exploration for humanity, and the possibility of life beyond Earth This article has been indexed from WeLiveSecurity Read the original article: How…
Why space exploration is important for Earth and its future: Q&A with David Eicher
We caught up with Astronomy magazine editor-in-chief David Eicher to talk about key challenges facing our planet, the benefits of space exploration, and the possibility of life beyond Earth This article has been indexed from WeLiveSecurity Read the original article:…
Major phishing-as-a-service platform disrupted – Week in security with Tony Anscombe
The investigation uncovered at least 40,000 phishing domains that were linked to LabHost and tricked victims into handing over their sensitive details This article has been indexed from WeLiveSecurity Read the original article: Major phishing-as-a-service platform disrupted – Week in…
What makes Starmus unique? A Q&A with award-winning filmmaker Todd Miller
The director of the Apollo 11 movie shares his views about the role of technology in addressing pressing global challenges, as well as why he became involved with Starmus This article has been indexed from WeLiveSecurity Read the original article:…
What makes Starmus unique? – A Q&A with award-winning filmmaker Todd Miller
The director of the Apollo 11 movie shares his views about the role of technology in addressing pressing global challenges as well as why he became involved with Starmus. This article has been indexed from WeLiveSecurity Read the original article:…
The vision behind Starmus – A Q&A with the festival’s co-founder Garik Israelian
Dr. Israelian talks about Starmus’s vision and mission, the importance of inspiring and engaging audiences, and the strong sense of community within the Starmus universe This article has been indexed from WeLiveSecurity Read the original article: The vision behind Starmus…
How technology drives progress – A Q&A with Nobel laureate Michel Mayor
We spoke to Michel Mayor about the importance of public engagement with science and fostering responsibility among the youth for the preservation of our changing planet This article has been indexed from WeLiveSecurity Read the original article: How technology drives…
The many faces of impersonation fraud: Spot an imposter before it’s too late
What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be? This article has been indexed from WeLiveSecurity Read the original article:…
Protecting yourself after a medical data breach – Week in security with Tony Anscombe
What are the risks and consequences of having your health data exposed and what are the steps to take if it happens to you? This article has been indexed from WeLiveSecurity Read the original article: Protecting yourself after a medical…
RDP remains a security concern – Week in security with Tony Anscombe
Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result This article has been indexed from WeLiveSecurity Read the original…
AceCryptor attacks surge in Europe – Week in security with Tony Anscombe
The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed the Rescoms RAT This article has been indexed from WeLiveSecurity Read the original article: AceCryptor attacks…
A prescription for privacy protection: Exercise caution when using a mobile health app
Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data This article has been indexed from WeLiveSecurity Read the original article: A prescription…
Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe
Healthcare organizations remain firmly in attackers’ crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023 This article has been indexed from WeLiveSecurity Read the original article: Healthcare still a prime…
Threat intelligence explained | Unlocked 403: A cybersecurity podcast
We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats This article has been indexed from WeLiveSecurity Read the original article: Threat intelligence explained | Unlocked 403: A cybersecurity podcast
How to share sensitive files securely online
Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe This article has been indexed from WeLiveSecurity Read the original article: How to share sensitive files…
APT attacks taking aim at Tibetans – Week in security with Tony Anscombe
Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor This article has been indexed from WeLiveSecurity Read the original article: APT attacks taking aim at…
Top 10 scams targeting seniors – and how to keep your money safe
The internet can be a wonderful place. But it’s also awash with fraudsters targeting people who are susceptible to fraud. This article has been indexed from WeLiveSecurity Read the original article: Top 10 scams targeting seniors – and how to…
Irresistible: Hooks, habits and why you can’t put down your phone
Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices. This article has been indexed from WeLiveSecurity Read the original article: Irresistible: Hooks, habits and why you can’t put down your phone
Deceptive AI content and 2024 elections – Week in security with Tony Anscombe
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year This article has been indexed from WeLiveSecurity Read the…
Vulnerabilities in business VPNs under the spotlight
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk This article has been indexed from WeLiveSecurity Read the original article: Vulnerabilities in business…