FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WeLiveSecurity

Fake job offers target software developers with infostealers

β€” February 20th 2025 at 14:11
A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims' crypto wallets and steals their login details from web browsers and password managers
☐ β˜† βœ‡ WeLiveSecurity

DeceptiveDevelopment targets freelance developers

β€” February 20th 2025 at 10:00
ESET researchers analyzed a campaign delivering malware bundled with job interview challenges
☐ β˜† βœ‡ WeLiveSecurity

No, you’re not fired – but beware of job termination scams

β€” February 18th 2025 at 10:00
Some employment scams take an unexpected turn as cybercriminals shift from β€œhiring” to β€œfiring” staff
☐ β˜† βœ‡ WeLiveSecurity

Katharine Hayhoe: The most important climate equation | Starmus highlights

β€” February 17th 2025 at 10:00
The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action
☐ β˜† βœ‡ WeLiveSecurity

Gaming or gambling? Lifting the lid on in-game loot boxes

β€” February 13th 2025 at 10:00
The virtual treasure chests and other casino-like rewards inside your children’s games may pose risks you shouldn’t play down
☐ β˜† βœ‡ WeLiveSecurity

What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)

β€” February 12th 2025 at 10:00
Ever wondered what it's like to hack for a living – legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security.
☐ β˜† βœ‡ WeLiveSecurity

How AI-driven identify fraud is causing havoc

β€” February 11th 2025 at 10:00
Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here's how to fight back
☐ β˜† βœ‡ WeLiveSecurity

Neil Lawrence: What makes us unique in the age of AI | Starmus highlights

β€” February 10th 2025 at 10:00
As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms large: what remains uniquely human?
☐ β˜† βœ‡ WeLiveSecurity

Patch or perish: How organizations can master vulnerability management

β€” February 5th 2025 at 10:00
Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching
☐ β˜† βœ‡ WeLiveSecurity

Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlights

β€” February 4th 2025 at 13:39
Left unchecked, AI's energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry without sacrificing performance?
☐ β˜† βœ‡ WeLiveSecurity

How scammers are exploiting DeepSeek's rise

β€” January 31st 2025 at 13:51
As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the latest big thing – plus, what else to know before using DeepSeek
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – January 2025 edition

β€” January 30th 2025 at 11:32
DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal another eventful year in cybersecurity and data privacy
☐ β˜† βœ‡ WeLiveSecurity

Untrustworthy AI: How to deal with data poisoning

β€” January 30th 2025 at 10:00
You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously so
☐ β˜† βœ‡ WeLiveSecurity

Brian Greene: Until the end of time | Starmus highlights

β€” January 29th 2025 at 08:38
The renowned physicist explores how time and entropy shape the evolution of the universe, the nature of existence, and the eventual fate of everything, including humanity
☐ β˜† βœ‡ WeLiveSecurity

Going (for) broke: 6 common online betting scams and how to avoid them

β€” January 28th 2025 at 10:00
Don’t roll the dice on your online safety – watch out for bogus sports betting apps and other traps commonly set by scammers
☐ β˜† βœ‡ WeLiveSecurity

The evolving landscape of data privacy: Key trends to shape 2025

β€” January 23rd 2025 at 10:00
Incoming laws, combined with broader developments on the threat landscape, will create further complexity and urgency for security and compliance teams
☐ β˜† βœ‡ WeLiveSecurity

PlushDaemon compromises supply chain of Korean VPN service

β€” January 22nd 2025 at 06:00
ESET researchers have discovered a supply-chain attack against a VPN provider in South Korea by a new China-aligned APT group we have named PlushDaemon
☐ β˜† βœ‡ WeLiveSecurity

Under lock and key: Protecting corporate data from cyberthreats in 2025

β€” January 21st 2025 at 10:00
Data breaches can cause a loss of revenue and market value as a result of diminished customer trust and reputational damage
☐ β˜† βœ‡ WeLiveSecurity

UEFI Secure Boot: Not so secure

β€” January 16th 2025 at 15:40
ESET researchers uncover a vulnerability in a UEFI application that could enable attackers to deploy malicious bootkits on unpatched systems
☐ β˜† βœ‡ WeLiveSecurity

Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344

β€” January 16th 2025 at 10:00
The story of a signed UEFI application allowing a UEFI Secure Boot bypass
☐ β˜† βœ‡ WeLiveSecurity

Cybersecurity and AI: What does 2025 have in store?

β€” January 15th 2025 at 10:00
In the hands of malicious actors, AI tools can enhance the scale and severity of all manner of scams, disinformation campaigns and other threats
☐ β˜† βœ‡ WeLiveSecurity

Protecting children online: Where Florida’s new law falls short

β€” January 14th 2025 at 10:00
Some of the state’s new child safety law can be easily circumvented. Should it have gone further?
☐ β˜† βœ‡ WeLiveSecurity

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe

β€” January 9th 2025 at 10:00
As detections of cryptostealers surge across Windows, Android and macOS, it's time for a refresher on how to keep your bitcoin or other crypto safe
☐ β˜† βœ‡ WeLiveSecurity

State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone

β€” January 7th 2025 at 10:00
The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats
☐ β˜† βœ‡ WeLiveSecurity

AI moves to your PC with its own special hardware

β€” January 6th 2025 at 10:00
Seeking to keep sensitive data private and accelerate AI workloads? Look no further than AI PCs powered by Intel Core Ultra processors with a built-in NPU.
☐ β˜† βœ‡ WeLiveSecurity

Gary Marcus: Taming Silicon Valley | Starmus highlights

β€” January 3rd 2025 at 10:00
The prominent AI researcher explores the societal impact of artificial intelligence and outlines his vision for a future in which AI upholds human rights, dignity, and fairness
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – December 2024 edition

β€” December 27th 2024 at 10:00
From attacks leveraging new new zero-day exploits to a major law enforcement crackdown, December 2024 was packed with impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Chris Hadfield: The sky is falling – what to do about space junk? | Starmus highlights

β€” December 23rd 2024 at 10:00
The first Canadian to walk in space dives deep into the origins of space debris, how it’s become a growing problem, and how we can clean up the orbital mess
☐ β˜† βœ‡ WeLiveSecurity

ESET Research Podcast: Telekopye, again

β€” December 20th 2024 at 10:00
Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of 'Neanderthals’ wield the Telekopye toolkit to ensnare unsuspecting victims they call 'Mammoths'
☐ β˜† βœ‡ WeLiveSecurity

Unwrapping Christmas scams | Unlocked 403 cybersecurity podcast (special edition)

β€” December 19th 2024 at 10:01
ESET's Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging online fraud
☐ β˜† βœ‡ WeLiveSecurity

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

β€” December 18th 2024 at 10:00
While you're enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company's defenses are ready, no matter the time of year
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report H2 2024: Key findings

β€” December 16th 2024 at 16:57
ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for staying secure in 2025
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report H2 2024

β€” December 16th 2024 at 10:00
A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
☐ β˜† βœ‡ WeLiveSecurity

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

β€” December 13th 2024 at 15:52
Our β€˜computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow
☐ β˜† βœ‡ WeLiveSecurity

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

β€” December 13th 2024 at 11:16
Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems
☐ β˜† βœ‡ WeLiveSecurity

Black Hat Europe 2024: Can AI systems be socially engineered?

β€” December 12th 2024 at 14:07
Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?
☐ β˜† βœ‡ WeLiveSecurity

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

β€” December 10th 2024 at 11:23
As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats?
☐ β˜† βœ‡ WeLiveSecurity

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

β€” December 9th 2024 at 10:00
Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost
☐ β˜† βœ‡ WeLiveSecurity

Philip Torr: AI to the people | Starmus highlights

β€” December 5th 2024 at 10:00
We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact
☐ β˜† βœ‡ WeLiveSecurity

Achieving cybersecurity compliance in 5 steps

β€” December 3rd 2024 at 10:00
Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements
☐ β˜† βœ‡ WeLiveSecurity

Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus highlights

β€” December 2nd 2024 at 10:00
ESET's CEO unpacks the complexities of cybersecurity in today’s hyper-connected world and highlights the power of innovation in stopping digital threats in their tracks
☐ β˜† βœ‡ WeLiveSecurity

Month in security with Tony Anscombe – November 2024 edition

β€” November 29th 2024 at 12:53
Zero days under attack, a new advisory from 'Five Eyes', thousands of ICS units left exposed, and mandatory MFA for all – it's a wrap on another month filled with impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Scams to look out for this holiday season

β€” November 28th 2024 at 10:00
β€˜Tis the season to be wary – be on your guard and don’t let fraud ruin your shopping spree
☐ β˜† βœ‡ WeLiveSecurity

Bootkitty marks a new chapter in the evolution of UEFI threats

β€” November 27th 2024 at 13:16
ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats
☐ β˜† βœ‡ WeLiveSecurity

Bootkitty: Analyzing the first UEFI bootkit for Linux

β€” November 27th 2024 at 07:00
ESET researchers analyze the first UEFI bootkit designed for Linux systems
☐ β˜† βœ‡ WeLiveSecurity

Firefox and Windows zero days chained to deliver the RomCom backdoor

β€” November 26th 2024 at 14:38
The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds
☐ β˜† βœ‡ WeLiveSecurity

RomCom exploits Firefox and Windows zero days in the wild

β€” November 26th 2024 at 10:00
ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously unknown Microsoft Windows vulnerability, combined in a zero-click exploit
☐ β˜† βœ‡ WeLiveSecurity

Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine

β€” November 21st 2024 at 10:00
ESET researchers analyzed previously unknown Linux backdoors that are connected to known Windows malware used by the China-aligned Gelsemium group, and to Project Wood
☐ β˜† βœ‡ WeLiveSecurity

Kathryn Thornton: Correcting Hubble's vision | Starmus highlights

β€” November 20th 2024 at 10:00
The veteran of four space missions discusses challenges faced by the Hubble Space Telescope and how human ingenuity and teamwork made Hubble’s success possible
☐ β˜† βœ‡ WeLiveSecurity

My information was stolen. Now what?

β€” November 19th 2024 at 10:00
The slow and painful recovery process
☐ β˜† βœ‡ WeLiveSecurity

What is β€œScam Likely”? Putting the phone down on unwanted calls

β€” November 18th 2024 at 10:00
Tired of dodging all those 'Scam Likely' calls? Here's what’s behind the label and how to stay one step ahead of phone scammers.
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q2 2024–Q3 2024: Key findings

β€” November 14th 2024 at 16:16
ESET Chief Security Evangelist Tony Anscombe highlights some of the most intriguing insights revealed in the latest ESET APT Activity Report
☐ β˜† βœ‡ WeLiveSecurity

ESET Research Podcast: Gamaredon

β€” November 13th 2024 at 10:00
ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and social engineering tactics, and even its estimated geolocation
☐ β˜† βœ‡ WeLiveSecurity

Beats by bot: The AI remix revolution

β€” November 12th 2024 at 10:00
Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the future of music
☐ β˜† βœ‡ WeLiveSecurity

Beyond the checkbox: Demystifying cybersecurity compliance

β€” November 11th 2024 at 10:00
In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield safeguarding assets, reputation, and the very survival of your business
☐ β˜† βœ‡ WeLiveSecurity

Life on a crooked RedLine: Analyzing the infamous infostealer’s backend

β€” November 8th 2024 at 10:00
Following the takedown of RedLine Stealer by international authorities, ESET researchers are publicly releasing their research into the infostealer’s backend modules
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q2 2024–Q3 2024

β€” November 7th 2024 at 09:55
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2024 and Q3 2024
☐ β˜† βœ‡ WeLiveSecurity

Jane Goodall: Reasons for hope | Starmus highlights

β€” November 6th 2024 at 14:48
The trailblazing scientist shares her reasons for hope in the fight against climate change and how we can tackle seemingly impossible problems and keep going in the face of adversity
☐ β˜† βœ‡ WeLiveSecurity

Month in security with Tony Anscombe – October 2024 edition

β€” October 31st 2024 at 14:29
Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories
☐ β˜† βœ‡ WeLiveSecurity

How to remove your personal information from Google Search results

β€” October 30th 2024 at 10:00
Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results.
❌