FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ WeLiveSecurity

Shedding light on AceCryptor and its operation

By: Jakub Kaloč — May 25th 2023 at 09:30

ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families

The post Shedding light on AceCryptor and its operation appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Digital security for the self‑employed: Staying safe without an IT team to help

By: Phil Muncaster — May 24th 2023 at 09:30

Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business

The post Digital security for the self‑employed: Staying safe without an IT team to help appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Android app breaking bad: From legitimate screen recording to file exfiltration within a year

By: Lukas Stefanko — May 23rd 2023 at 09:30

ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio

The post Android app breaking bad: From legitimate screen recording to file exfiltration within a year appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The real cost of a free lunch – Week in security with Tony Anscombe

By: Editor — May 19th 2023 at 12:30

Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for

The post The real cost of a free lunch – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Top 5 search engines for internet‑connected devices and services

By: Camilo Gutiérrez Amaya — May 18th 2023 at 09:30

A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet

The post Top 5 search engines for internet‑connected devices and services appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Meet “AI”, your new colleague: could it expose your company’s secrets?

By: Roman Cuprik — May 17th 2023 at 09:30

Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk

The post Meet “AI”, your new colleague: could it expose your company’s secrets? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

You may not care where you download software from, but malware does

By: Aryeh Goretsky — May 16th 2023 at 09:30

Why do people still download files from sketchy places and get compromised as a result?

The post You may not care where you download software from, but malware does appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe

By: Editor — May 12th 2023 at 15:15

What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business?

The post Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Why you need parental control software – and 5 features to look for

By: Phil Muncaster — May 12th 2023 at 09:30

Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize

The post Why you need parental control software – and 5 features to look for appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Turning on stealth mode: 5 simple strategies for staying under the radar online

By: André Lameiras — May 10th 2023 at 09:30

Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details

The post Turning on stealth mode: 5 simple strategies for staying under the radar online appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET APT Activity Report Q4 2022­–Q1 2023

By: Jean-Ian Boutin — May 9th 2023 at 09:30

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023

The post ESET APT Activity Report Q4 2022­–Q1 2023 appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

How the war in Ukraine has been a catalyst in private‑public collaborations

By: André Lameiras — May 9th 2023 at 08:00

As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital

The post How the war in Ukraine has been a catalyst in private‑public collaborations appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

APTs target MSP access to customer networks – Week in security with Tony Anscombe

By: Editor — May 5th 2023 at 14:00

The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers

The post APTs target MSP access to customer networks – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Creating strong, yet user‑friendly passwords: Tips for your business password policy

By: Roman Cuprik — May 4th 2023 at 09:30

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization

The post Creating strong, yet user‑friendly passwords: Tips for your business password policy appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Using Discord? Don’t play down its privacy and security risks

By: Márk Szabó — May 3rd 2023 at 09:30

It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut

The post Using Discord? Don’t play down its privacy and security risks appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

APT groups muddying the waters for MSPs

By: James Shepperd — May 2nd 2023 at 09:30

A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers

The post APT groups muddying the waters for MSPs appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

By: Editor — April 28th 2023 at 14:30

The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated

The post What was hot at RSA Conference 2023? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

RSA Conference 2023 – How AI will infiltrate the world

By: Cameron Camp — April 26th 2023 at 14:30

As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications

The post RSA Conference 2023 – How AI will infiltrate the world appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Evasive Panda APT group delivers malware via updates for popular Chinese software

By: Facundo Muñoz — April 26th 2023 at 09:30

ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software

The post Evasive Panda APT group delivers malware via updates for popular Chinese software appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Did you mistakenly sell your network access? – Week in security with Tony Anscombe

By: Editor — April 21st 2023 at 10:00

Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks

The post Did you mistakenly sell your network access? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack

By: Peter Kálnai — April 20th 2023 at 09:30

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack

The post Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The EU’s Cyber Solidarity Act: Security Operations Centers to the rescue!

By: Márk Szabó — April 19th 2023 at 13:15

The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents

The post The EU’s Cyber Solidarity Act: Security Operations Centers to the rescue! appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

PC running slow? 10 ways you can speed it up

By: André Lameiras — April 19th 2023 at 09:30

Before you rush to buy new hardware, try these simple tricks to get your machine up to speed again – and keep it that way.

The post PC running slow? 10 ways you can speed it up appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Discarded, not destroyed: Old routers reveal corporate secrets

By: Cameron Camp — April 18th 2023 at 13:00

When decommissioning their old hardware, many companies 'throw the baby out with the bathwater'

The post Discarded, not destroyed: Old routers reveal corporate secrets appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Hunting down BlackLotus – Week in security with Tony Anscombe

By: Editor — April 14th 2023 at 11:00

Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers

The post Hunting down BlackLotus – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Safety first: 5 cybersecurity tips for freelance bloggers

By: Márk Szabó — April 14th 2023 at 09:30

The much-dreaded writer’s block isn’t the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers?

The post Safety first: 5 cybersecurity tips for freelance bloggers appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What are the cybersecurity concerns of SMBs by sector?

By: Editor — April 12th 2023 at 09:30

Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured

The post What are the cybersecurity concerns of SMBs by sector? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

10 things to look out for when buying a password manager

By: Phil Muncaster — April 11th 2023 at 09:30

Here's how to choose the right password vault for you and what exactly to consider when weighing your options

The post 10 things to look out for when buying a password manager appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Steer clear of tax scams – Week in security with Tony Anscombe

By: Editor — April 6th 2023 at 14:15

In a rush to file your taxes? Watch out for cybercriminals preying on stressed taxpayers as Tax Day looms large on the horizon.

The post Steer clear of tax scams – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Cleaning up your social media and passwords: What to trash and what to treasure

By: Thomas Uhlemann — April 6th 2023 at 09:30

Give your social media presence a good spring scrubbing, audit your passwords and other easy ways to bring order to your digital chaos

The post Cleaning up your social media and passwords: What to trash and what to treasure appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Why you should spring clean your home network and audit your backups

By: Thomas Uhlemann — April 5th 2023 at 09:30

Do you know how many devices are connected to your home network? You don’t? This is precisely why it’s time for a network audit.

The post Why you should spring clean your home network and audit your backups appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Spring into action and tidy up your digital life like a pro

By: Thomas Uhlemann — April 4th 2023 at 09:30

Spring is in the air and as the leaves start growing again, why not breathe some new life into the devices you depend on so badly?

The post Spring into action and tidy up your digital life like a pro appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Avoiding data backup failures – Week in security with Tony Anscombe

By: Editor — March 31st 2023 at 13:00

Today is World Backup Day, but maybe we also need a "did you test your backups" day?

The post Avoiding data backup failures – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

World Backup Day: Avoiding a data disaster is a forever topic 

By: Márk Szabó — March 31st 2023 at 09:30

By failing to prepare you are preparing to fail. Make sure you're able to bounce back if, or when, a data disaster strikes.

The post World Backup Day: Avoiding a data disaster is a forever topic  appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine

By: ESET Research — March 30th 2023 at 09:30

ESET experts share their insights on the cyber-elements of the first year of the war in Ukraine and how a growing number of destructive malware variants tried to rip through critical Ukrainian systems

The post ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Pig butchering scams: The anatomy of a fast‑growing threat

By: Márk Szabó — March 29th 2023 at 09:30

How fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers

The post Pig butchering scams: The anatomy of a fast‑growing threat appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Staying safe on OnlyFans: The naked truth

By: Jake Moore — March 28th 2023 at 09:30

How content creators and subscribers can embrace the social media platform without (overly) exposing themselves to the potentially toxic brew of NSFW content and privacy threats

The post Staying safe on OnlyFans: The naked truth appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Highlights from TikTok CEO’s Congress grilling – Week in security with Tony Anscombe

By: Editor — March 24th 2023 at 15:50

Here are some of the key moments from the five hours of Shou Zi Chew's testimony and other interesting news on the data privacy front

The post Highlights from TikTok CEO’s Congress grilling – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What TikTok knows about you – and what you should know about TikTok

By: Roman Cuprik — March 24th 2023 at 10:30

As TikTok CEO attempts to placate U.S. lawmakers, it’s time for us all to think about the wealth of personal information that TikTok and other social media giants collect about us

The post What TikTok knows about you – and what you should know about TikTok appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Understanding Managed Detection and Response – and what to look for in an MDR solution

By: Phil Muncaster — March 23rd 2023 at 10:30

Why your organization should consider an MDR solution and five key things to look for in a service offering

The post Understanding Managed Detection and Response – and what to look for in an MDR solution appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Twitter ends free SMS 2FA: Here’s how you can protect your account now

By: Roman Cuprik — March 20th 2023 at 16:30

Twitter’s ditching of free text-message authentication doesn’t mean that you should forgo using 2FA. Instead, switch to another – and, indeed, better – 2FA option.

The post Twitter ends free SMS 2FA: Here’s how you can protect your account now appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Banking turmoil opens opportunities for fraud – Week in security with Tony Anscombe

By: Editor — March 17th 2023 at 15:30

Scammers are looking to cash in on the chaos that has set in following the startling meltdowns of Silicon Valley Bank and Signature Bank and the crisis at Credit Suisse

The post Banking turmoil opens opportunities for fraud – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

SVB’s collapse is a scammer’s dream: Don’t get caught out

By: Phil Muncaster — March 17th 2023 at 11:12

How cybercriminals can exploit Silicon Valley Bank's downfall for their own ends – and at your expense

The post SVB’s collapse is a scammer’s dream: Don’t get caught out appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Not‑so‑private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets

By: Lukas Stefanko — March 16th 2023 at 10:30

ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR to steal cryptocurrency funds

The post Not‑so‑private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

By: Facundo Muñoz — March 14th 2023 at 10:30

ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group

The post The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 signs you’ve fallen for a scam – and what to do next

By: Phil Muncaster — March 13th 2023 at 10:30

Here’s how to know you have fallen victim to a scam – and what to do in order to undo or mitigate the damage.

The post 5 signs you’ve fallen for a scam – and what to do next appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe

By: Editor — March 10th 2023 at 14:00

A request to move an online conversation to a supposedly more secure platform may not be as well-meaning as it sounds

The post APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Common WhatsApp scams and how to avoid them

By: André Lameiras — March 10th 2023 at 10:30

Here's a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them.

The post Common WhatsApp scams and how to avoid them appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

‘A woman from Mars’: Life in the pursuit of space exploration

By: Alžbeta Kovaľová — March 8th 2023 at 10:30

An astrobiologist, analog astronaut, author and speaker, Dr. Michaela Musilova shares her experience as a woman at the forefront of space exploration and from her quest for scientific and personal excellence

The post ‘A woman from Mars’: Life in the pursuit of space exploration appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials

By: Lukas Stefanko — March 7th 2023 at 10:30

ESET researchers analyze a cyberespionage campaign that distributes CapraRAT backdoors through trojanized and supposedly secure Android messaging apps – but also exfiltrates sensitive information

The post Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe

By: Editor — March 3rd 2023 at 13:00

A bootkit that ESET researchers have discovered in the wild is the BlackLotus UEFI bootkit that is being peddled on hacking forums

The post What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT

By: Alexandre Côté Cyr — March 2nd 2023 at 10:30

ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol

The post MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

BlackLotus UEFI bootkit: Myth confirmed

By: Martin Smolár — March 1st 2023 at 10:30

The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality

The post BlackLotus UEFI bootkit: Myth confirmed appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

By: ESET Research — February 28th 2023 at 10:30

And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in the final four months of 2022.

The post ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022 appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe

By: Editor — February 24th 2023 at 13:00

With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected?

The post One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

A year of wiper attacks in Ukraine

By: ESET Research — February 24th 2023 at 10:30

ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022

The post A year of wiper attacks in Ukraine appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

WinorDLL64: A backdoor from the vast Lazarus arsenal?

By: Vladislav Hrčka — February 23rd 2023 at 10:30

The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group

The post WinorDLL64: A backdoor from the vast Lazarus arsenal? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Writing like a boss with ChatGPT and how to get better at spotting phishing scams

By: Phil Muncaster — February 22nd 2023 at 10:30

It’s never been easier to write a convincing message that can trick you into handing over your money or personal data

The post Writing like a boss with ChatGPT and how to get better at spotting phishing scams appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

ESET SMB Digital Security Sentiment Report: The damaging effects of a breach

By: Editor — February 21st 2023 at 10:30

SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are breached

The post ESET SMB Digital Security Sentiment Report: The damaging effects of a breach appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Will ChatGPT start writing killer malware?

By: Cameron Camp — February 20th 2023 at 10:30

AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware?

The post Will ChatGPT start writing killer malware? appeared first on WeLiveSecurity

❌