FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayWeLiveSecurity

A slippery slope: Beware of Winter Olympics scams and other cyberthreats

Itโ€™s snow joke โ€“ sporting events are a big draw for cybercriminals. Make sure youโ€™re not on the losing side by following these best practices.

This month in security with Tony Anscombe โ€“ January 2026 edition

The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year

Drowning in spam or scam emails? Hereโ€™s probably why

Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons โ€“ and how to stem the tide.

Children and chatbots: What parents should know

As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development

Old habits die hard: 2025โ€™s most common passwords were as predictable as ever

Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well

Why LinkedIn is a hunting ground for threat actors โ€“ and how to protect yourself

The business social networking site is a vast, publicly accessible database of corporate information. Donโ€™t believe everyone on the site is who they say they are.

Is it time for internet services to adopt identity verification?

Should verified identities become the standard online? Australiaโ€™s social media ban for under-16s shows why the question matters.

Your personal information is on the dark web. What happens next?

If your data is on the dark web, itโ€™s probably only a matter of time before itโ€™s abused for fraud or account hijacking. Hereโ€™s what to do.

Credential stuffing: What it is and how to protect yourself

Reusing passwords may feel like a harmless shortcut โ€“ until a single breach opens the door to multiple accounts

This month in security with Tony Anscombe โ€“ December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year

Black Hat Europe 2025: Was that device designed to be on the internet at all?

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found

Black Hat Europe 2025: Reputation matters โ€“ even in the ransomware economy

Being seen as reliable is good for โ€˜businessโ€™ and ransomware groups care about 'brand reputation' just as much as their victims

Locks, SOCs and a cat in a box: What Schrรถdinger can teach us about cybersecurity

If you donโ€™t look inside your environment, you canโ€™t know its true state โ€“ and attackers count on that

Seeking symmetry during ATT&CKยฎ season: How to harness todayโ€™s diverse analyst and tester landscape to paint a security masterpiece

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.

The big catch: How whaling attacks target top executives

Is your organizationโ€™s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.

Oversharing is not caring: Whatโ€™s at stake if your employees post too much online

From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.

This month in security with Tony Anscombe โ€“ November 2025 edition

Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news

What parents should know to protect their children from doxxing

Online disagreements among young people can easily spiral out of control. Parents need to understand whatโ€™s at stake.

Influencers in the crosshairs: How cybercriminals are targeting content creators

Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.

MDR is the answer โ€“ now, whatโ€™s the question?

Why your business needs the best-of-breed combination of technology and human expertise

The OSINT advantage: Find your weak spots before attackers do

Hereโ€™s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots

What if your romantic AI chatbot canโ€™t keep a secret?

Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.

How password managers can be hacked โ€“ and how to stay safe

Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe

Why shadow AI could be your biggest security blind spot

From unintentional data leakage to buggy code, hereโ€™s why you should care about unsanctioned AI use in your company

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security

The who, where, and how of APT attacks in Q2 2025โ€“Q3 2025

ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report

How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you โ€“ and what you can do to stay one step ahead

Ground zero: 5 things to do after discovering a cyberattack

When every minute counts, preparation and precision can mean the difference between disruption and disaster

This month in security with Tony Anscombe โ€“ October 2025 edition

From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecurity right now

Cybersecurity Awareness Month 2025: When seeing isn't believing

Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams

Recruitment red flags: Can you spot a spy posing as a job seeker?

Hereโ€™s what to know about a recent spin on an insider threat โ€“ fake North Korean IT workers infiltrating western firms

How MDR can give MSPs the edge in a competitive market

With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs

Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows

Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures

Cybersecurity Awareness Month 2025: Building resilience against ransomware

Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?

Minecraft mods: Should you 'hack' your game?

Some Minecraft mods donโ€™t help build worlds โ€“ they break them. Hereโ€™s how malware can masquerade as a Minecraft mod.

IT service desks: The security blind spot that may put your business at risk

Could a simple call to the helpdesk enable threat actors to bypass your security controls? Hereโ€™s how your team can close a growing security gap.

Cybersecurity Awareness Month 2025: Why software patching matters more than ever

As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.

AI-aided malvertising: Exploiting a chatbot to spread scams

Cybercriminals have tricked Xโ€™s AI chatbot into promoting phishing scams in a technique that has been nicknamed โ€œGrokkingโ€. Hereโ€™s what to know about it.

How Uber seems to know where you are โ€“ even with restricted location permissions

Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.

Cybersecurity Awareness Month 2025: Passwords alone are not enough

Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders.

The case for cybersecurity: Why successful businesses are built on protection

Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging

Cybersecurity Awareness Month 2025: Knowledge is power

We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals

This month in security with Tony Anscombe โ€“ September 2025 edition

The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans

Roblox executors: Itโ€™s all fun and games until someone gets hacked

You could be getting more than you bargained for when you download that cheat tool promising quick wins

Small businesses, big targets: Protecting your business against ransomware

Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality

Are cybercriminals hacking your systems โ€“ or just logging in?

As bad actors often simply waltz through companiesโ€™ digital front doors with a key, hereโ€™s how to keep your own door locked tight

Preventing business disruption and building cyber-resilience with MDR

Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy

Under lock and key: Safeguarding business data with encryption

As the attack surface expands and the threat landscape grows more complex, itโ€™s time to consider whether your data protection strategy is fit for purpose

This month in security with Tony Anscombe โ€“ August 2025 edition

From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news

Donโ€™t let โ€œback to schoolโ€ become โ€œback to (cyber)bullyingโ€

Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back

"What happens online stays online" and other cyberbullying myths, debunked

Separating truth from fiction is the first step towards making better parenting decisions. Letโ€™s puncture some of the most common misconceptions about online harassment.

The need for speed: Why organizations are turning to rapid, trustworthy MDR

How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries

Supply-chain dependencies: Check your resilience blind spot

Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?

How the always-on generation can level up its cybersecurity game

Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think

WinRAR zero-day exploited in espionage attacks against high-value targets

The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds

Android adware: What is it, and how do I get it off my device?

Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Hereโ€™s what to do.
โŒ