As another hospital falls victim to ransomware, Tony weighs in on the much-debated issue of banning ransomware payouts The post French hospital crippled by cyberattack – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been…
Tag: welivesecurity
What is doxing and how to protect yourself
Doxing can happen to anyone – here’s how you can reduce the odds that your personal information will be weaponized against you The post What is doxing and how to protect yourself appeared first on WeLiveSecurity This article has been…
Is your personal data all over the internet? 7 steps to cleaning up your online presence
You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps The post Is your personal data all over the internet? 7 steps to cleaning up your online presence…
Is your personal data all over the internet? 7 steps to cleaning up your online presence
You may not be able to disappear completely from the internet, but you can minimize your digital footprint with a few simple steps The post Is your personal data all over the internet? 7 steps to cleaning up your online…
Google and Apple both release patches against zero‑day vulnerabilities – Week in security with Tony Anscombe
Zero-day vulnerabilities are super active and Google and Apple are acting to patch these vulnerabilities, some of which seen on-the-wild. The post Google and Apple both release patches against zero‑day vulnerabilities – Week in security with Tony Anscombe appeared first…
A step‑by‑step guide to enjoy LinkedIn safely
LinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot buttons to enable, select, accept or reject. To make sure you have control over your information we bring you a…
How a spoofed email passed the SPF check and landed in my inbox
The Sender Policy Framework can’t help prevent spam and phishing if you allow billions of IP addresses to send as your domain The post How a spoofed email passed the SPF check and landed in my inbox appeared first on…
DEF CON – “don’t worry, the elections are safe” edition
Don’t worry, elections are safe. Our Security Researcher Cameron Camp provide us highlights from the DEF CON 30 conference. The post DEF CON – “don’t worry, the elections are safe” edition appeared first on WeLiveSecurity This article has been indexed…
Black Hat – Windows isn’t the only mass casualty platform anymore
Windows used to be the big talking point when it came to exploits resulting in mass casualties. Nowadays, talks turned to other massive attack platforms like #cloud and cars The post Black Hat – Windows isn’t the only mass casualty…
Black Hat USA 2022: Burnout, a significant issue
The digital skills gap, especially in cybersecurity, is not a new phenomenon. This problematic is now exacerbate by the prevalence of burnout, which was presented at Black Hat USA 2022 The post Black Hat USA 2022: Burnout, a significant issue…
The potential consequences of data breach, and romance scams – Week in security with Tony Anscombe
The NHS was victim of a potential cyberattack, which raises the question of the impact of those data breach for the public. The post The potential consequences of data breach, and romance scams – Week in security with Tony Anscombe…
Safety first: how to tweak the settings on your dating apps
Tinder, Bumble or Grindr – popular dating apps depend heavily on your location, personal data, and loose privacy settings. Find out how to put yourself out there safely by following our suggested settings tweaks. The post Safety first: how to…
Black Hat 2022‑ Cyberdefense in a global threats era
Our Security evangelist’s take on this first day of Black Hat 2022, where cyberdefense was on every mind. The post Black Hat 2022‑ Cyberdefense in a global threats era appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity…
An eighties classic – Zero Trust
A deep-dive in Zero-trust, to help you navigate in a zero-trust world and further secure your organization. The post An eighties classic – Zero Trust appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article:…
How to check if your PC has been hacked, and what to do next
Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it. The post How to check if your PC has been hacked, and what…
Develop a zero‑trust environment to protect your organization – Week in security with Tony Anscombe
Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization. The post Develop a zero‑trust environment to protect your organization – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has been…
Don’t get singed by scammers while you’re carrying the torch for Tinder
Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used…
Start as you mean to go on: the top 10 steps to securing your new computer
Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer’s pc, learn the steps to protect your new PC from cyberthreats. The post Start as you mean to go on: the top 10…
Staying safe online: How to browse the web securely
Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web. The post Staying safe online: How to browse the web securely appeared first on WeLiveSecurity This…
Music streaming platform victim of a crypto theft – Week in security with Tony Anscombe
Cybercriminals exploited a vulnerability to steal the equivalent of 18M$ from the NFT music streaming platform Audius, while other cyberthreats related to crypto makes the news. The post Music streaming platform victim of a crypto theft – Week in security…
Cash App fraud: 10 common scams to watch out for
It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash The post Cash App fraud: 10…
NFT: A new‑fangled trend or also a new‑found treasure?
I’ve created an NFT so you don’t have to – here’s the good, the bad and the intangible of the hot-ticket tokens The post NFT: A new‑fangled trend or also a new‑found treasure? appeared first on WeLiveSecurity This article has…
macOS malware: myth vs. reality – Week in security with Tony Anscombe
ESET research shows yet again that macOS is not immune to malware – and why some users can benefit from Apple’s Lockdown Mode The post macOS malware: myth vs. reality – Week in security with Tony Anscombe appeared first on…
ESET Research Podcast: Hot security topics at RSA or mostly hype?
Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices The post ESET Research Podcast: Hot security topics at RSA or mostly hype?…
I see what you did there: A look at the CloudMensis macOS spyware
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs The post I see what you did there: A look at the CloudMensis macOS spyware appeared first on WeLiveSecurity…
Think twice before downloading pirated games – Week in security with Tony Anscombe
Why downloading pirated video games may ultimately cost you dearly and how to stay safe while gaming online The post Think twice before downloading pirated games – Week in security with Tony Anscombe appeared first on WeLiveSecurity This article has…
API security moves mainstream
The heavyweights are now moving into API security, cementing it as “A Thing” The post API security moves mainstream appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: API security moves mainstream
Collaboration and knowledge sharing key to progress in cybersecurity
In a world of ever-evolving cyberthreats, collaboration and knowledge exchange are vital for keeping an edge on attackers The post Collaboration and knowledge sharing key to progress in cybersecurity appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity…
Play it safe: 5 reasons not to download pirated games
It’s all fun and games until you get hacked – and this is just one risk of downloading cracked games The post Play it safe: 5 reasons not to download pirated games appeared first on WeLiveSecurity This article has been…
Driving to France this summer? Watch out for scam websites before you go
Scammers don’t take the summer off – be on your guard when buying your Crit’Air sticker The post Driving to France this summer? Watch out for scam websites before you go appeared first on WeLiveSecurity This article has been indexed…
Avoid travel digital disasters – Week in security with Tony Anscombe
Vacations are a great time to unwind, but if you’re not careful, you may face a digital disaster. Here’s how to keep your devices and data secure while you’re on the move The post Avoid travel digital disasters – Week…
8 common Facebook Marketplace scams and how to avoid them
Here’s what to watch out for when buying or selling stuff on the online marketplace and how to tell if you’re being scammed The post 8 common Facebook Marketplace scams and how to avoid them appeared first on WeLiveSecurity This…
Cyberattacks: A very real existential threat to organizations
One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay? The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity This article has been indexed…
Phishing scam poses as Canadian tax agency before Canada Day
The lead-up to the Canada Day festivities has brought a tax scam with it The post Phishing scam poses as Canadian tax agency before Canada Day appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
Watch out for survey scams – Week in security with Tony Anscombe
As scammers continue to ask people to take fake surveys, can you recognize some common telltale signs you’re dealing with a scam? The post Watch out for survey scams – Week in security with Tony Anscombe appeared first on WeLiveSecurity…
Costco 40th anniversary scam targets WhatsApp users
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is The post Costco 40th anniversary scam targets WhatsApp users appeared first…
Do back offices mean backdoors?
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture The post Do back offices mean backdoors? appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original article: Do…
5 ways cybercriminals steal credit card details
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity This article…
Instagram’s new age verification tool – Week in security with Tony Anscombe
As Instagram tests a new age verification tool, what are some of the concerns when it comes to confirming someone’s age on the internet? The post Instagram’s new age verification tool – Week in security with Tony Anscombe appeared first…
Virtual private networks: 5 common questions about VPNs answered
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the original…
Phishing awareness training: Help your employees avoid the hook
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity Read the…
Crypto mixers: What are they and how are they used?
How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity This article has been indexed from WeLiveSecurity…
How to spot malicious spam – Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam The post How to spot malicious spam – Week in security with…
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
This article has been indexed from WeLiveSecurity Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents? The post How Emotet is changing…
Industroyer: A cyber‑weapon that brought down a power grid
This article has been indexed from WeLiveSecurity Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids The post Industroyer: A cyber‑weapon that brought down a power grid appeared…
RSA – APIs, your organization’s dedicated backdoors
This article has been indexed from WeLiveSecurity API-based data transfer is so rapid, there’s but little time to stop very bad things happening quickly The post RSA – APIs, your organization’s dedicated backdoors appeared first on WeLiveSecurity Read the original…
3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity Here are three themes that stood out at the world’s largest gathering of cybersecurity professionals The post 3 takeaways from RSA Conference 2022 – Week in security with Tony Anscombe appeared first on…
RSA – Creepy real‑world edition
This article has been indexed from WeLiveSecurity Digital fiddling somehow got mixed up in a real war The post RSA – Creepy real‑world edition appeared first on WeLiveSecurity Read the original article: RSA – Creepy real‑world edition
RSA – Digital healthcare meets security, but does it really want to?
This article has been indexed from WeLiveSecurity Technology is understandably viewed as a nuisance to be managed in pursuit of the health organizations’ primary mission The post RSA – Digital healthcare meets security, but does it really want to? appeared…
RSA – Spot the real fake
This article has been indexed from WeLiveSecurity How erring on the side of privacy might ultimately save you from chasing down a virtual robot of you doing the bidding of a scammer The post RSA – Spot the real fake…
Cybersecurity awareness training: What is it and what works best?
This article has been indexed from WeLiveSecurity Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk The post Cybersecurity awareness training: What is it…
100 days of war in Ukraine: How the conflict is playing out in cyberspace
This article has been indexed from WeLiveSecurity It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict The post 100 days of war in Ukraine: How the conflict is playing out…
Key insights from ESET’s latest Threat Report – Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity A review of the key trends that defined the threatscape in the first four months of 2022 and what these developments mean for your cyber-defenses The post Key insights from ESET’s latest Threat…
ESET Threat Report T 1 2022
This article has been indexed from WeLiveSecurity A view of the T 1 2022 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts The post ESET Threat Report T 1 2022 appeared first…
Talking to children about the internet: A kid’s perspective
This article has been indexed from WeLiveSecurity A 14-year-old shares his thoughts about technology and the potential privacy and security implications of the internet The post Talking to children about the internet: A kid’s perspective appeared first on WeLiveSecurity Read…
Keeping it real: Don’t fall for lies about the war
This article has been indexed from WeLiveSecurity Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what’s in the fake news The post Keeping it real: Don’t fall for lies…
Cybersecurity: A global problem that requires a global answer
This article has been indexed from WeLiveSecurity New and exacerbated cyber-risks following Russia’s invasion of Ukraine are fueling a new urgency towards enhancing resilience The post Cybersecurity: A global problem that requires a global answer appeared first on WeLiveSecurity Read…
Scams targeting NFT investors – Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity As with everything digital, there’s someone, somewhere devising a method to steal the assets away from their rightful owners The post Scams targeting NFT investors – Week in security with Tony Anscombe appeared…
ESET Research Podcast: UEFI in crosshairs of ESPecter bootkit
This article has been indexed from WeLiveSecurity Listen to Aryeh Goretsky, Martin Smolár, and Jean-Ian Boutin discuss what UEFI threats are capable of and what the ESPecter bootkit tells us about their evolution The post ESET Research Podcast: UEFI in…
5 reasons why GDPR was a milestone for data protection
This article has been indexed from WeLiveSecurity The landmark regulation changed everyone’s mindset on how companies worldwide collect and use the personal data of EU citizens The post 5 reasons why GDPR was a milestone for data protection appeared first…
Common NFT scams and how to avoid them
This article has been indexed from WeLiveSecurity As NFTs exploded in popularity, scammers also jumped on the hype. Watch out for counterfeit NFTs, rug pulls, pump-and-dumps and other common scams plaguing the industry. The post Common NFT scams and how…
Sandworm deploys new version of ArguePatch malware loader
This article has been indexed from WeLiveSecurity ArguePatch was previously used in the Industroyer2 and CaddyWiper attacks The post Sandworm deploys new version of ArguePatch malware loader appeared first on WeLiveSecurity Read the original article: Sandworm deploys new version of…
Cryptocurrency: secure or not? – Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity When you hear the term ‘cryptocurrency’, does ‘secure’ also spring to mind? Here are some implications of the lack of sound security practices in the world of crypto. The post Cryptocurrency: secure or…
The flip side of the coin: Why crypto is catnip for criminals
This article has been indexed from WeLiveSecurity Cybercriminals continue to mine for opportunities in the crypto space – here’s what you should know about coin-mining hacks and crypto theft The post The flip side of the coin: Why crypto is…
Fake news – why do people believe it?
This article has been indexed from WeLiveSecurity In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real The post Fake news – why do people believe…
The downside of ‘debugging’ ransomware
This article has been indexed from WeLiveSecurity The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code The post The downside of ‘debugging’ ransomware…
How to spot and avoid a phishing attack – Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity Can you spot the tell-tale signs of a phishing attempt and check if an email that has landed in your inbox is legit? The post How to spot and avoid a phishing attack…
10 reasons why we fall for scams
This article has been indexed from WeLiveSecurity The ‘it won’t happen to me’ mindset leaves you unprepared – here are some common factors that put any of us at risk of online fraud The post 10 reasons why we fall…
Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap
This article has been indexed from WeLiveSecurity What can organizations do to capitalize on the current fluidity in the job market and bring fresh cybersecurity talent into the fold? The post Opportunity out of crisis: Tapping the Great Resignation to…
Common LinkedIn scams: Beware of phishing attacks and fake job offers
This article has been indexed from WeLiveSecurity LinkedIn scammers attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling victim to fraud when using the platform The post Common…
Defending against APT attacks – Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity The conflict in Ukraine has highlighted the risks of cyberespionage attacks that typically involve Advanced Persistent Threat groups and often target organizations’ most valuable data The post Defending against APT attacks – Week…
There’s no sugarcoating it: That online sugar daddy may be a scammer
This article has been indexed from WeLiveSecurity The bitter truth about how fraudsters dupe online daters in this new twist on romance fraud The post There’s no sugarcoating it: That online sugar daddy may be a scammer appeared first on…
3 most dangerous types of Android malware
This article has been indexed from WeLiveSecurity Here’s what you should know about some of the nastiest mobile malware – from malicious software that takes phones and data hostage to RATs that allow hackers to control devices remotely The post…
What’s behind the record‑high number of zero days?
This article has been indexed from WeLiveSecurity Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity The post What’s behind the record‑high number of zero days?…
TA410 under the microscope – Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity Here’s what you should know about FlowingFrog, LookingFrog and JollyFrog – the three teams making up the TA410 espionage umbrella group The post TA410 under the microscope – Week in security with Tony…
A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity
This article has been indexed from WeLiveSecurity ESET researchers reveal a detailed profile of TA410: we believe this cyberespionage umbrella group consists of three different teams using different toolsets, including a new version of the FlowCloud espionage backdoor discovered by…
The trouble with BEC: How to stop the costliest internet scam
This article has been indexed from WeLiveSecurity BEC fraud generated more losses for victims than any other type of cybercrime in 2021. It’s long past time that organizations got a handle on these scams. The post The trouble with BEC:…
Webcam hacking: How to know if someone may be spying on you through your webcam
This article has been indexed from WeLiveSecurity Camfecting doesn’t ‘just’ invade your privacy – it could seriously impact your mental health and wellbeing. Here’s how to keep an eye on your laptop camera. The post Webcam hacking: How to know…
Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity As the Five Eyes nations warn of attacks against critical infrastructure, we look at the potentially cascading effects of such attacks and how essential systems and services can ramp up their defense The…
Critical infrastructure: Under cyberattack for longer than you might think
This article has been indexed from WeLiveSecurity Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services The post Critical infrastructure: Under cyberattack for longer than you…
When “secure” isn’t secure at all: High‑impact UEFI vulnerabilities discovered in Lenovo consumer laptops
This article has been indexed from WeLiveSecurity ESET researchers discover multiple vulnerabilities in various Lenovo laptop models that allow an attacker with admin privileges to expose the user to firmware-level malware The post When “secure” isn’t secure at all: High‑impact…
How can we support young people in harnessing technology for progress?
This article has been indexed from WeLiveSecurity Young people are not passive victims of technology or helpless addicts. They are technology creators and agents with diverse backgrounds and interests. The post How can we support young people in harnessing technology…
Is your Lenovo laptop vulnerable to cyberattack?
This article has been indexed from WeLiveSecurity Here’s what to know about vulnerabilities in more than 100 Lenovo consumer laptop models and what you can do right away to stay safe – all in under three minutes The post Is…
Fake e‑shops on the prowl for banking credentials using Android malware
This article has been indexed from WeLiveSecurity ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks The post Fake e‑shops on the prowl for banking credentials using Android malware appeared first on WeLiveSecurity Read the original article:…
We’re going on Tor
This article has been indexed from WeLiveSecurity If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the…
Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity Under the hood of Wslink’s VM – The energy sector & cyber-risk – SMB cybersecurity survival tips The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the original article:…
Cybersecurity survival tips for small businesses: 2022 edition
This article has been indexed from WeLiveSecurity How can businesses that lack the resources and technological expertise of large organizations hold the line against cybercriminals? The post Cybersecurity survival tips for small businesses: 2022 edition appeared first on WeLiveSecurity Read…
Women in tech: Unique insights from a lifelong pursuit of innovation
This article has been indexed from WeLiveSecurity Leading Slovak computer scientist Mária Bieliková shares her experience working as a woman driving technological innovation and reflects on how to inspire the next generation of talent in tech The post Women in tech:…
Europe’s quest for energy independence – and how cyber‑risks come into play
This article has been indexed from WeLiveSecurity Soaring energy prices and increased geopolitical tensions amid the Russian invasion of Ukraine bring a sharp focus on European energy security The post Europe’s quest for energy independence – and how cyber‑risks come…
Under the hood of Wslink’s multilayered virtual machine
This article has been indexed from WeLiveSecurity ESET researchers describe the structure of the virtual machine used in samples of Wslink and suggest a possible approach to see through its obfuscation techniques The post Under the hood of Wslink’s multilayered…
Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity ESET discovers Mustang Panda’s Hodur trojan – Crypto malware targeting Android and iOS users alike – Nation-state digital deterrent The post Week in security with Tony Anscombe appeared first on WeLiveSecurity Read the…
Crypto malware in patched wallets targeting Android and iOS devices
This article has been indexed from WeLiveSecurity ESET Research uncovers a sophisticated scheme that distributes trojanized Android and iOS apps posing as popular cryptocurrency wallets The post Crypto malware in patched wallets targeting Android and iOS devices appeared first on…
Is a nation‑state digital deterrent scenario so far‑fetched?
This article has been indexed from WeLiveSecurity Why has the conflict in Ukraine not caused the much anticipated global cyber-meltdown? The post Is a nation‑state digital deterrent scenario so far‑fetched? appeared first on WeLiveSecurity Read the original article: Is a…
Mustang Panda’s Hodur: Old tricks, new Korplug variant
This article has been indexed from WeLiveSecurity ESET researchers have discovered Hodur, a previously undocumented Korplug variant spread by Mustang Panda, that uses phishing lures referencing current events in Europe, including the invasion of Ukraine The post Mustang Panda’s Hodur:…
Sandworm: A tale of disruption told anew
This article has been indexed from WeLiveSecurity As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again The post Sandworm: A tale of disruption told anew appeared first on WeLiveSecurity Read the…
Defending the data center: The time to act is now
This article has been indexed from WeLiveSecurity Cyberattacks against data centers may ultimately be everyone’s problem – how prepared are their operators for the heightened risk of cyber-assaults? The post Defending the data center: The time to act is now…
Week in security with Tony Anscombe
This article has been indexed from WeLiveSecurity ESET Research finds another data wiper in Ukraine – Securing data centers against threats – A cultural divide between the military and Silicon Valley The post Week in security with Tony Anscombe appeared…
US military vs. Silicon Valley – a cultural divide
This article has been indexed from WeLiveSecurity The US military knows it needs to speed up technology adoption through optimization, something at the heart of Silicon Valley culture The post US military vs. Silicon Valley – a cultural divide appeared…
CaddyWiper: New wiper malware discovered in Ukraine
This article has been indexed from WeLiveSecurity This is the third time in as many weeks that ESET researchers have spotted previously unknown data wiping malware taking aim at Ukrainian organizations The post CaddyWiper: New wiper malware discovered in Ukraine…
A first look at threat intelligence and threat hunting tools
This article has been indexed from WeLiveSecurity An overview of some of the most popular open-source tools for threat intelligence and threat hunting The post A first look at threat intelligence and threat hunting tools appeared first on WeLiveSecurity Read…