ESET Chief Security Evangelist Tony Anscombe looks at some of the report’s standout findings and their implications for staying secure in 2025 This article has been indexed from WeLiveSecurity Read the original article: ESET Threat Report H2 2024: Key findings
Tag: welivesecurity
Black Hat Europe 2024: Why a CVSS score of 7.5 may be a ‘perfect’ 10 in your organization
Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems This article has been indexed from WeLiveSecurity Read…
Black Hat Europe 2024: Hacking a car – or rather, its infotainment system
Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2024: Hacking a…
Black Hat Europe 2024: Can AI systems be socially engineered?
Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? This article has been indexed from WeLiveSecurity Read the original article: Black Hat Europe 2024: Can AI systems be socially engineered?
How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)
As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization’s security strategy keep pace with today’s rapidly evolving threats? This article has been indexed from WeLiveSecurity Read the original article: How cyber-secure is your business? |…
Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks
Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost This article has been indexed from WeLiveSecurity Read the original article: Are…
Philip Torr: AI to the people | Starmus Highlights
We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact This article has been indexed from WeLiveSecurity Read the original article: Philip Torr: AI to…
ESET APT Activity Report Q2 2024–Q3 2024: Key findings
ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity Report This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q2 2024–Q3 2024: Key…
ESET Research Podcast: Gamaredon
ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation This article has been indexed from WeLiveSecurity Read the original article: ESET…
Beyond the checkbox: Demystifying cybersecurity compliance
In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business This article has been indexed from WeLiveSecurity Read the original…
Beats by bot: The AI remix revolution
Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the future of sound This article has been indexed from WeLiveSecurity Read the original article: Beats by bot: The AI remix…
Jane Goodall: Reasons for hope | Starmus highlights
The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity This article has been indexed from WeLiveSecurity Read the original…
Month in security with Tony Anscombe – October 2024 edition
Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories This article has been indexed from WeLiveSecurity Read the original article: Month in security with Tony…
How to remove your personal information from Google Search results
Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results. This article has been indexed from WeLiveSecurity Read the original article: How to remove your…
Tony Fadell: Innovating to save our planet | Starmus highlights
As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts This article has been indexed from WeLiveSecurity Read the original article: Tony Fadell: Innovating…
ESET Research Podcast: CosmicBeetle
Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world This article has been indexed from WeLiveSecurity Read the original article: ESET Research Podcast: CosmicBeetle
Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe
The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year This article has been indexed from WeLiveSecurity Read the original…
Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)
“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online and even be the start of a predatory relationship This article has been indexed from WeLiveSecurity Read the…
GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe
ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities This article has been indexed from WeLiveSecurity Read the original article: GoldenJackal jumps the air gap ……
Cyber insurance, human risk, and the potential for cyber-ratings
Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility? This article has been indexed from WeLiveSecurity Read the original article: Cyber insurance, human risk, and the potential for cyber-ratings