Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe This article has been indexed from WeLiveSecurity Read the original article: How password managers can be hacked – and…
Category: welivesecurity
Why shadow AI could be your biggest security blind spot
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company This article has been indexed from WeLiveSecurity Read the original article: Why shadow AI could be your biggest security blind spot
The who, where, and how of APT attacks in Q2 2025–Q3 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: The who, where, and how of APT…
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security This article has been indexed from WeLiveSecurity Read the original article: In memoriam: David Harley
ESET APT Activity Report Q2 2025–Q3 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2 2025–Q3 2025
Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data This article has been indexed from WeLiveSecurity Read the original article: Sharing is scaring: The WhatsApp screen-sharing scam you didn’t see coming
How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)
Think you could never fall for an online scam? Think again. Here’s how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead This article has been indexed from WeLiveSecurity Read the…
Ground zero: 5 things to do after discovering a cyberattack
When every minute counts, preparation and precision can mean the difference between disruption and disaster This article has been indexed from WeLiveSecurity Read the original article: Ground zero: 5 things to do after discovering a cyberattack
Gamaredon X Turla collab
Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine This article has been indexed from WeLiveSecurity Read the original article: Gamaredon X Turla collab
Small businesses, big targets: Protecting your business against ransomware
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises This article has been indexed from WeLiveSecurity Read the original article: Small businesses, big targets: Protecting your business…
HybridPetya: The Petya/NotPetya copycat comes with a twist
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality This article has been indexed from WeLiveSecurity Read the original article: HybridPetya: The Petya/NotPetya copycat comes with a twist
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal This article has been indexed from WeLiveSecurity Read the original article: Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
Are cybercriminals hacking your systems – or just logging in?
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door firmly locked tight This article has been indexed from WeLiveSecurity Read the original article: Are cybercriminals hacking your systems…
Preventing business disruption and building cyber-resilience with MDR
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy This article has been indexed from WeLiveSecurity Read the original article: Preventing business disruption and building cyber-resilience…
Under lock and key: Safeguarding business data with encryption
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose This article has been indexed from WeLiveSecurity Read the original article: Under lock and key:…
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results This article has been indexed from WeLiveSecurity Read the original article: GhostRedirector poisons Windows…
This month in security with Tony Anscombe – August 2025 edition
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news This article has been indexed from WeLiveSecurity Read the…
Don’t let “back to school” become “back to (cyber)bullying”
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back This article has been indexed from WeLiveSecurity Read the original article: Don’t let “back to school” become “back to (cyber)bullying”
First known AI-powered ransomware uncovered by ESET Research
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats This article has been indexed from WeLiveSecurity Read the original article: First known AI-powered ransomware uncovered by ESET Research
“What happens online stays online” and other cyberbullying myths, debunked
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment. This article has been indexed from WeLiveSecurity Read the original article: “What happens online stays online”…