Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2025: Was that device designed to be on the…
Tag: welivesecurity
Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity
If you don’t look inside your environment, you can’t know its true state – and attackers count on that This article has been indexed from WeLiveSecurity Read the original article: Locks, SOCs and a cat in a box: What Schrödinger…
Black Hat Europe 2025: Reputation matters – even in the ransomware economy
Being seen as reliable is good for ‘business’ and ransomware groups care about ‘brand reputation’ just as much as their victims This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2025: Reputation matters – even…
Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience. This article has been indexed from WeLiveSecurity Read the original article: Seeking symmetry during ATT&CK® season: How to harness today’s…
The big catch: How whaling attacks target top executives
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe. This article has been indexed from WeLiveSecurity Read the original article: The big catch: How whaling attacks target top executives
Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
Identity is effectively the new network boundary. It must be protected at all costs. This article has been indexed from WeLiveSecurity Read the original article: Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
MuddyWater: Snakes by the riverbank
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook This article has been indexed from WeLiveSecurity Read the original article: MuddyWater: Snakes by the riverbank
Oversharing is not caring: What’s at stake if your employees post too much online
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble. This article has been indexed from WeLiveSecurity Read the original article: Oversharing is not caring:…
This month in security with Tony Anscombe – November 2025 edition
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month’s cybersecurity news This article has been indexed from WeLiveSecurity Read the original article: This month in security with Tony…
What parents should know to protect their children from doxxing
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake. This article has been indexed from WeLiveSecurity Read the original article: What parents should know to protect their children from doxxing
Influencers in the crosshairs: How cybercriminals are targeting content creators
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters. This article has been indexed from WeLiveSecurity Read the original article: Influencers in the crosshairs: How cybercriminals are…
MDR is the answer – now, what’s the question?
Why your business needs the best-of-breed combination of technology and human expertise This article has been indexed from WeLiveSecurity Read the original article: MDR is the answer – now, what’s the question?
The OSINT playbook: Find your weak spots before attackers do
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots This article has been indexed from WeLiveSecurity Read the original article: The OSINT playbook: Find your weak…
PlushDaemon compromises network devices for adversary-in-the-middle attacks
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks This article has been indexed from WeLiveSecurity Read the original article: PlushDaemon compromises network devices for adversary-in-the-middle attacks
What if your romantic AI chatbot can’t keep a secret?
Does your chatbot know too much? Think twice before you tell your AI companion everything. This article has been indexed from WeLiveSecurity Read the original article: What if your romantic AI chatbot can’t keep a secret?
How password managers can be hacked – and how to stay safe
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe This article has been indexed from WeLiveSecurity Read the original article: How password managers can be hacked – and…
Why shadow AI could be your biggest security blind spot
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company This article has been indexed from WeLiveSecurity Read the original article: Why shadow AI could be your biggest security blind spot
The who, where, and how of APT attacks in Q2 2025–Q3 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: The who, where, and how of APT…
In memoriam: David Harley
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security This article has been indexed from WeLiveSecurity Read the original article: In memoriam: David Harley
ESET APT Activity Report Q2 2025–Q3 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2 2025–Q3 2025