Category: welivesecurity

First known AI-powered ransomware uncovered by ESET Research

The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats This article has been indexed from WeLiveSecurity Read the original article: First known AI-powered ransomware uncovered by ESET Research

Investors beware: AI-powered financial scams swamp social media

Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think. This article has been indexed from WeLiveSecurity Read the original article: Investors beware: AI-powered financial scams swamp social media

How the always-on generation can level up its cybersecurity game

Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think This article has been indexed from WeLiveSecurity Read the original article: How the always-on generation can level up its cybersecurity…

Supply-chain dependencies: Check your resilience blind spot

Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them? This article has been indexed from WeLiveSecurity Read the original article: Supply-chain dependencies: Check your resilience blind spot

WinRAR zero-day exploited in espionage attacks against high-value targets

The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds This article has been indexed from WeLiveSecurity Read the original article: WinRAR zero-day exploited in espionage attacks against high-value targets

ToolShell: An all-you-can-eat buffet for threat actors

ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities This article has been indexed from WeLiveSecurity Read the original article: ToolShell: An all-you-can-eat buffet for threat actors

Unmasking AsyncRAT: Navigating the labyrinth of forks

ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants This article has been indexed from WeLiveSecurity Read the original article: Unmasking AsyncRAT: Navigating the labyrinth of forks

Task scams: Why you should never pay to get paid

Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams. This article has been indexed from WeLiveSecurity Read the original article: Task scams: Why you should…

How government cyber cuts will affect you and your business

Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks This article has been indexed from WeLiveSecurity Read the original article: How government cyber cuts will affect…

ESET Threat Report H1 2025: Key findings

ESET Chief Security Evangelist Tony Anscombe reviews some of the report’s standout findings and their implications for organizations in 2025 and beyond This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H1 2025: Key findings

This month in security with Tony Anscombe – June 2025 edition

From Australia’s new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news This article has been indexed from WeLiveSecurity Read the original article: This month in security with Tony Anscombe –…

ESET Threat Report H1 2025

A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H1 2025

BladedFeline: Whispering in the dark

ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig This article has been indexed from WeLiveSecurity Read the original article: BladedFeline: Whispering in the dark

This month in security with Tony Anscombe – May 2025 edition

From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it’s a wrap on another month filled with impactful cybersecurity news This article has been indexed from WeLiveSecurity Read the original article: This month in…

Word to the wise: Beware of fake Docusign emails

Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data This article has been indexed from WeLiveSecurity Read the original article: Word to the wise: Beware of fake…

Danabot under the microscope

ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure This article has been indexed from WeLiveSecurity Read the original article: Danabot under the microscope

Lumma Stealer: Down for the count

The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies This article has been indexed from WeLiveSecurity Read the original article: Lumma Stealer: Down for…

Danabot: Analyzing a fallen empire

ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation This article has been indexed from WeLiveSecurity Read the original article: Danabot: Analyzing a fallen empire

ESET APT Activity Report Q4 2024–Q1 2025

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q4 2024–Q1 2025

The who, where, and how of APT attacks in Q4 2024–Q1 2025

ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: The who, where, and how of APT attacks in Q4…

Operation RoundPress

ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities This article has been indexed from WeLiveSecurity Read the original article: Operation RoundPress

Sednit abuses XSS flaws to hit gov’t entities, defense companies

Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU This article has been indexed from WeLiveSecurity Read the original article: Sednit abuses XSS flaws to…

Catching a phish with many faces

Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly This article has been indexed from WeLiveSecurity Read the original article: Catching a phish with many…

RSAC 2025 wrap-up – Week in security with Tony Anscombe

From the power of collaborative defense to identity security and AI, catch up on the event’s key themes and discussions This article has been indexed from WeLiveSecurity Read the original article: RSAC 2025 wrap-up – Week in security with Tony…

This month in security with Tony Anscombe – April 2025 edition

From the near-demise of MITRE’s CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity This article has been indexed from WeLiveSecurity Read the original article: This month…

How safe and secure is your iPhone really?

Your iPhone isn’t necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors. This article has been indexed from WeLiveSecurity Read the…

Deepfake ‘doctors’ take to TikTok to peddle bogus cures

Look out for AI-generated ‘TikDocs’ who exploit the public’s trust in the medical profession to drive sales of sketchy supplements This article has been indexed from WeLiveSecurity Read the original article: Deepfake ‘doctors’ take to TikTok to peddle bogus cures

How fraudsters abuse Google Forms to spread scams

The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe. This article has been indexed from WeLiveSecurity Read the original article: How fraudsters abuse Google Forms to spread scams

Will super-smart AI be attacking us anytime soon?

What practical AI attacks exist today? “More than zero” is the answer – and they’re getting better. This article has been indexed from WeLiveSecurity Read the original article: Will super-smart AI be attacking us anytime soon?

CapCut copycats are on the prowl

Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to attempt to steal their data or hijack their devices instead This article has been indexed from WeLiveSecurity Read the original article: CapCut copycats are on the prowl

Watch out for these traps lurking in search results

Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results This article has been indexed from WeLiveSecurity Read the original article: Watch out for these traps lurking in search…

So your friend has been hacked: Could you be next?

When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe. This article has been indexed from WeLiveSecurity Read the original article: So your…

1 billion reasons to protect your identity online

Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t. This article has been indexed from…

Fake job offers target software developers with infostealers

A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims’ crypto wallets and steals their login details from web browsers and password managers This article has been indexed from WeLiveSecurity Read the original article: Fake job offers target…

Gaming or gambling? Lifting the lid on in-game loot boxes

The virtual treasure chests and other casino-like rewards inside your children’s games may pose risks you shouldn’t play down This article has been indexed from WeLiveSecurity Read the original article: Gaming or gambling? Lifting the lid on in-game loot boxes

How scammers are exploiting DeepSeek’s success

As eager as ever to capitalize on the latest big thing, cybercriminals have wasted no time launching attacks that take advantage of the meteoric rise of DeepSeek’s AI model This article has been indexed from WeLiveSecurity Read the original article:…

Untrustworthy AI: How to deal with data poisoning

You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so This article has been indexed from WeLiveSecurity Read the original article: Untrustworthy AI: How to deal with data poisoning

This month in security with Tony Anscombe – January 2025 edition

DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal another eventful year in cybersecurity and data privacy This article has been indexed from WeLiveSecurity Read the original article: This…

Brian Greene: Until the end of time | Starmus highlights

The renowned physicist explores how time and entropy shape the evolution of the universe, the nature of existence, and the eventual fate of everything, including humanity This article has been indexed from WeLiveSecurity Read the original article: Brian Greene: Until…

The evolving landscape of data privacy: Key trends to shape 2025

Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams This article has been indexed from WeLiveSecurity Read the original article: The evolving landscape of data privacy: Key trends…

UEFI Secure Boot: Not so secure?

A vulnerability affecting a UEFI application and discovered by ESET researchers could let malicious actors deploy malicious bootkits on vulnerable systems This article has been indexed from WeLiveSecurity Read the original article: UEFI Secure Boot: Not so secure?

Cybersecurity and AI: What does 2025 have in store?

In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats This article has been indexed from WeLiveSecurity Read the original article: Cybersecurity and AI: What does…

AI moves to your PC with its own special hardware

Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU. This article has been indexed from WeLiveSecurity Read the original article: AI moves to…

Gary Marcus – Taming Silicon Valley | Starmus Highlights

The prominent AI researcher explores the societal impact of artificial intelligence and calls for a reimagined approach to AI development that avoids the dangers of surveillance capitalism This article has been indexed from WeLiveSecurity Read the original article: Gary Marcus…

ESET Threat Report H2 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe looks at some of the report’s standout findings and their implications for staying secure in 2025 This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H2 2024: Key findings

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2024: Can AI systems be socially engineered?

Philip Torr: AI to the people | Starmus Highlights

We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact This article has been indexed from WeLiveSecurity Read the original article: Philip Torr: AI to…

Bootkitty marks a new chapter in the evolution of UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats This article has been indexed from WeLiveSecurity Read the original article: Bootkitty marks a new chapter in…

RomCom exploits Firefox and Windows zero days in the wild

ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit This article has been indexed from WeLiveSecurity Read the original article:…

Kathryn Thornton: Correcting Hubble’s vision | Starmus Highlights

The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork made Hubble’s success possible This article has been indexed from WeLiveSecurity Read the original article: Kathryn Thornton: Correcting Hubble’s vision…

My information was stolen. Now what?

The slow and painful recovery process This article has been indexed from WeLiveSecurity Read the original article: My information was stolen. Now what?

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2 2024–Q3 2024: Key…

ESET Research Podcast: Gamaredon

ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation This article has been indexed from WeLiveSecurity Read the original article: ESET…

Beyond the checkbox: Demystifying cybersecurity compliance

In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business This article has been indexed from WeLiveSecurity Read the original…

Beats by bot: The AI remix revolution

Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the future of sound This article has been indexed from WeLiveSecurity Read the original article: Beats by bot: The AI remix…

Jane Goodall: Reasons for hope | Starmus highlights

The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity This article has been indexed from WeLiveSecurity Read the original…