The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app
The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023
The results of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Best Cybersecurity Vendor Blog is... drumroll, please... WeLiveSecurity!
$90,000/year, full home office, and 30 days of paid leave for a junior data analyst β what's not to like? Except that these kinds of job offers are only intended to trick unsuspecting victims into giving up their data.
Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky β unless you know where to look
What is the state of artificial intelligence in 2024 and how can AI level up your cybersecurity game? These hot topics and pressing questions surrounding AI were front and center at the annual conference.
As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?
Available as both an IDA plugin and a Python script, Nimfilt helps to reverse engineer binaries compiled with the Nim programming language compiler by demangling package and function names, and applying structs to strings
The prerequisites for becoming a security elite create a skills ceiling that is tough to break through β especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum?
This week, ESET experts released several research publications that shine the spotlight on a number of notable campaigns and broader developments on the threat landscape
ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs
One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft
We spoke to climate scientist Katharine Hayhoe about climate change, faith and psychology β and how to channel anxiety about the state of our planet into meaningful action
Weβre thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates β Best Cybersecurity Vendor Blog category of the European Cybersecurity Blogger Awards 2024
More than 40,000 security experts descended on San Francisco this week. Let's now look back on some of the event's highlights β including the CISA-led 'Secure by Design' pledge also signed by ESET.
Can AI effortlessly thwart all sorts of cyberattacks? Letβs cut through the hyperbole surrounding the tech and look at its actual strengths and limitations.
As Starmus Earth draws near, we caught up with Dr. Garik Israelian to celebrate the fusion of science and creativity and venture where imagination flourishes and groundbreaking ideas take flight
Their innocuous looks and endearing names mask their true power. These gadgets are designed to help identify and prevent security woes, but what if they fall into the wrong hands?
Organizations that fall victim to a ransomware attack are often caught between a rock and a hard place, grappling with the dilemma of whether to pay up or not
Once your crypto has been stolen, it is extremely difficult to get back β be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over
Faced with expanding attack surfaces and a barrage of threats, businesses of all sizes are increasingly looking to unlock the manifold capabilities of enterprise-grade security
We spoke to Astronomy magazine editor-in-chief David Eicher about key challenges facing our planet, the importance of space exploration for humanity, and the possibility of life beyond Earth
The director of the Apollo 11 movie shares his views about the role of technology in addressing pressing global challenges, as well as why he became involved with Starmus
We spoke to Michel Mayor about the importance of public engagement with science and how to foster responsibility among the youth for the preservation of our changing planet
Dr. Israelian talks about Starmus's vision and mission, the importance of inspiring and engaging audiences, and a sense of community within the Starmus universe
From promoting questionable content to posing security risks, inappropriate ads present multiple dangers for children. Hereβs how to help them stay safe.
Should childrenβs apps come with βwarning labelsβ? Here's how to make sure your children's digital playgrounds are safe places to play and learn.
Here's what drives cybercriminals to relentlessly target the personal information of other people β and why you need to guard your data like your life depends on it
Temu's cash giveaway where people were asked to hand over vast amounts of their personal data to the platform puts the spotlight on the data-slurping practices of online services today
Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result
Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Hereβs how to avoid being scammed when considering a loan.