Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?
Category: welivesecurity
Black Hat USA 2025: Policy compliance and the myth of the silver bullet
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong? This article has been indexed from WeLiveSecurity Read the original article: Black Hat USA 2025: Policy compliance and the myth of the silver bullet
ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another This article has been indexed from WeLiveSecurity Read the original article: ESET Threat…
Why the tech industry needs to stand firm on preserving end-to-end encryption
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity This article has been indexed from WeLiveSecurity Read the original article: Why the tech industry needs…
Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)
Here’s what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much This article has been indexed from WeLiveSecurity Read the original article: Is your phone spying on…
This month in security with Tony Anscombe – July 2025 edition
Here’s a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025 This article has been indexed from WeLiveSecurity Read the original article: This month in security with Tony Anscombe – July…
The hidden risks of browser extensions – and how to stay safe
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for This article has been indexed from WeLiveSecurity Read the original article: The hidden risks of browser extensions – and how to stay…
SharePoint under fire: ToolShell attacks hit organizations worldwide
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks This article has been indexed from WeLiveSecurity Read the original article: SharePoint under fire: ToolShell…
Rogue CAPTCHAs: Look out for phony verification pages spreading malware
Before rushing to prove that you’re not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware This article has been indexed from WeLiveSecurity Read the original article: Rogue CAPTCHAs: Look out for…
ToolShell: An all-you-can-eat buffet for threat actors
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities This article has been indexed from WeLiveSecurity Read the original article: ToolShell: An all-you-can-eat buffet for threat actors
Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4)
Behind every free online service, there’s a price being paid. Learn why your digital footprint is so valuable, and why you might be the product. This article has been indexed from WeLiveSecurity Read the original article: Why is your data…
Unmasking AsyncRAT: Navigating the labyrinth of forks
ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants This article has been indexed from WeLiveSecurity Read the original article: Unmasking AsyncRAT: Navigating the labyrinth of forks
ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits
ESET experts discuss Sandworm’s new data wiper, UnsolicitedBooker’s relentless campaigns, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q4…
ESET Threat Report H1 2025: Key findings
ESET Chief Security Evangelist Tony Anscombe reviews some of the report’s standout findings and their implications for organizations in 2025 and beyond This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H1 2025: Key findings
This month in security with Tony Anscombe – June 2025 edition
From Australia’s new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news This article has been indexed from WeLiveSecurity Read the original article: This month in security with Tony Anscombe –…
ESET Threat Report H1 2025
A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H1 2025
BladedFeline: Whispering in the dark
ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig This article has been indexed from WeLiveSecurity Read the original article: BladedFeline: Whispering in the dark
Don’t let dormant accounts become a doorway for cybercriminals
Do you have online accounts you haven’t used in years? If so, a bit of digital spring cleaning might be in order. This article has been indexed from WeLiveSecurity Read the original article: Don’t let dormant accounts become a doorway…
This month in security with Tony Anscombe – May 2025 edition
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it’s a wrap on another month filled with impactful cybersecurity news This article has been indexed from WeLiveSecurity Read the original article: This month in…
Word to the wise: Beware of fake Docusign emails
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data This article has been indexed from WeLiveSecurity Read the original article: Word to the wise: Beware of fake…