FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WeLiveSecurity

Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability

β€” August 11th 2025 at 09:00
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
☐ β˜† βœ‡ WeLiveSecurity

Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurer’s?

β€” August 8th 2025 at 14:25
A sky-high premium may not always reflect your company’s security posture
☐ β˜† βœ‡ WeLiveSecurity

Android adware: What is it, and how do I get it off my device?

β€” August 8th 2025 at 09:00
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
☐ β˜† βœ‡ WeLiveSecurity

Black Hat USA 2025: Policy compliance and the myth of the silver bullet

β€” August 7th 2025 at 16:03
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
☐ β˜† βœ‡ WeLiveSecurity

Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

β€” August 7th 2025 at 14:23
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch

β€” August 5th 2025 at 09:00
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
☐ β˜† βœ‡ WeLiveSecurity

Why the tech industry needs to stand firm on preserving end-to-end encryption

β€” August 1st 2025 at 09:00
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
☐ β˜† βœ‡ WeLiveSecurity

The hidden risks of browser extensions – and how to stay safe

β€” July 29th 2025 at 09:00
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
☐ β˜† βœ‡ WeLiveSecurity

ToolShell: An all-you-can-eat buffet for threat actors

β€” July 24th 2025 at 09:00
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities
☐ β˜† βœ‡ WeLiveSecurity

Rogue CAPTCHAs: Look out for phony verification pages spreading malware

β€” July 24th 2025 at 08:30
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
☐ β˜† βœ‡ WeLiveSecurity

Unmasking AsyncRAT: Navigating the labyrinth of forks

β€” July 15th 2025 at 08:59
ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants
☐ β˜† βœ‡ WeLiveSecurity

Task scams: Why you should never pay to get paid

β€” July 4th 2025 at 09:00
Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.
☐ β˜† βœ‡ WeLiveSecurity

How government cyber cuts will affect you and your business

β€” July 3rd 2025 at 09:00
Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks
☐ β˜† βœ‡ WeLiveSecurity

Gamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolset

β€” July 2nd 2025 at 08:58
ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q4 2024–Q1 2025: Malware sharing, wipers and exploits

β€” July 1st 2025 at 09:00
ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report
☐ β˜† βœ‡ WeLiveSecurity

ESET Threat Report H1 2025

β€” June 26th 2025 at 09:38
A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
☐ β˜† βœ‡ WeLiveSecurity

BladedFeline: Whispering in the dark

β€” June 5th 2025 at 09:00
ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig
☐ β˜† βœ‡ WeLiveSecurity

Don’t let dormant accounts become a doorway for cybercriminals

β€” June 2nd 2025 at 09:00
Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.
☐ β˜† βœ‡ WeLiveSecurity

Word to the wise: Beware of fake Docusign emails

β€” May 27th 2025 at 09:00
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data
☐ β˜† βœ‡ WeLiveSecurity

Danabot: Analyzing a fallen empire

β€” May 22nd 2025 at 20:03
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation
☐ β˜† βœ‡ WeLiveSecurity

ESET takes part in global operation to disrupt Lumma Stealer

β€” May 21st 2025 at 16:15
Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation
☐ β˜† βœ‡ WeLiveSecurity

ESET APT Activity Report Q4 2024–Q1 2025

β€” May 19th 2025 at 08:55
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025
☐ β˜† βœ‡ WeLiveSecurity

Operation RoundPress

β€” May 15th 2025 at 07:22
ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities
☐ β˜† βœ‡ WeLiveSecurity

Catching a phish with many faces

β€” May 9th 2025 at 09:00
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly
☐ β˜† βœ‡ WeLiveSecurity

Beware of phone scams demanding money for β€˜missed jury duty’

β€” May 7th 2025 at 09:00
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer.
☐ β˜† βœ‡ WeLiveSecurity

Toll road scams are in overdrive: Here’s how to protect yourself

β€” May 6th 2025 at 09:00
Have you received a text message about an unpaid road toll? Make sure you’re not the next victim of a smishing scam.
☐ β˜† βœ‡ WeLiveSecurity

TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks

β€” April 30th 2025 at 09:00
ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks
☐ β˜† βœ‡ WeLiveSecurity

How safe and secure is your iPhone really?

β€” April 28th 2025 at 09:47
Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
☐ β˜† βœ‡ WeLiveSecurity

Deepfake 'doctors' take to TikTok to peddle bogus cures

β€” April 25th 2025 at 09:00
Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements
☐ β˜† βœ‡ WeLiveSecurity

How fraudsters abuse Google Forms to spread scams

β€” April 23rd 2025 at 09:00
The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.
☐ β˜† βœ‡ WeLiveSecurity

Will super-smart AI be attacking us anytime soon?

β€” April 22nd 2025 at 09:00
What practical AI attacks exist today? β€œMore than zero” is the answer – and they’re getting better.
☐ β˜† βœ‡ WeLiveSecurity

CapCut copycats are on the prowl

β€” April 17th 2025 at 09:00
Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to attempt to steal their data or hijack their devices instead
☐ β˜† βœ‡ WeLiveSecurity

Attacks on the education sector are surging: How can cyber-defenders respond?

β€” April 14th 2025 at 09:00
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?
☐ β˜† βœ‡ WeLiveSecurity

Watch out for these traps lurking in search results

β€” April 10th 2025 at 09:00
Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results
☐ β˜† βœ‡ WeLiveSecurity

So your friend has been hacked: Could you be next?

β€” April 9th 2025 at 09:00
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
☐ β˜† βœ‡ WeLiveSecurity

1 billion reasons to protect your identity online

β€” April 8th 2025 at 09:00
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.
☐ β˜† βœ‡ WeLiveSecurity

The good, the bad and the unknown of AI: A Q&A with MΓ‘ria BielikovΓ‘

β€” April 3rd 2025 at 09:00
The computer scientist and AI researcher shares her thoughts on the technology’s potential and pitfalls – and what may lie ahead for us
☐ β˜† βœ‡ WeLiveSecurity

Resilience in the face of ransomware: A key to business survival

β€” March 31st 2025 at 09:00
Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage
☐ β˜† βœ‡ WeLiveSecurity

Making it stick: How to get the most out of cybersecurity training

β€” March 28th 2025 at 10:00
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill β€˜sticky’ habits that will kick in when a danger is near
☐ β˜† βœ‡ WeLiveSecurity

Shifting the sands of RansomHub’s EDRKillShifter

β€” March 26th 2025 at 14:58
ESET researchers discover new ties between affiliates of RansomHub and of rival gangs Medusa, BianLian, and Play
☐ β˜† βœ‡ WeLiveSecurity

You will always remember this as the day you finally caught FamousSparrow

β€” March 26th 2025 at 14:45
ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor, SparrowDoor
☐ β˜† βœ‡ WeLiveSecurity

Operation FishMedley

β€” March 20th 2025 at 10:00
ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON
☐ β˜† βœ‡ WeLiveSecurity

Operation AkaiRyΕ«: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor

β€” March 18th 2025 at 10:00
ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor
☐ β˜† βœ‡ WeLiveSecurity

When IT meets OT: Cybersecurity for the physical world

β€” March 14th 2025 at 10:00
While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT threat
☐ β˜† βœ‡ WeLiveSecurity

Don’t let cybercriminals steal your Spotify account

β€” March 11th 2025 at 10:00
Listen up, this is sure to be music to your ears – a few minutes spent securing your account today can save you a ton of trouble tomorrow
☐ β˜† βœ‡ WeLiveSecurity

AI-driven deception: A new face of corporate fraud

β€” March 10th 2025 at 10:00
Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses
☐ β˜† βœ‡ WeLiveSecurity

Martin Rees: Post-human intelligence – a cosmic perspective | Starmus highlights

β€” March 3rd 2025 at 10:00
Take a moment to think beyond our current capabilities and consider what might come next in the grand story of evolution
☐ β˜† βœ‡ WeLiveSecurity

Threat Report H2 2024: Infostealer shakeup, new attack vector for mobile, and Nomani

β€” February 28th 2025 at 10:00
Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams on social media
☐ β˜† βœ‡ WeLiveSecurity

Bernhard Schölkopf: Is AI intelligent? | Starmus highlights

β€” February 27th 2025 at 10:00
With AI's pattern recognition capabilities well-established, Mr. SchΓΆlkopf's talk shifts the focus to a pressing question: what will be the next great leap for AI?
☐ β˜† βœ‡ WeLiveSecurity

Laurie Anderson: Building an ARK | Starmus highlights

β€” February 24th 2025 at 10:00
The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times
β˜‘ β˜† βœ‡ WeLiveSecurity

Will Windows 10 leave enterprises vulnerable to zero-days?

β€” March 13th 2015 at 11:24
One thing Microsoft has been very public about is Windows 10's new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.
β˜‘ β˜† βœ‡ WeLiveSecurity

Hackers phish for data with fake Apple Watch giveaway

β€” March 12th 2015 at 14:13
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.
β˜‘ β˜† βœ‡ WeLiveSecurity

Operating System Vulnerabilities, Exploits and Insecurity

β€” March 10th 2015 at 13:40
iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.
β˜‘ β˜† βœ‡ WeLiveSecurity

CryptoFortress mimics TorrentLocker but is a different ransomware

β€” March 9th 2015 at 17:25
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware.
β˜‘ β˜† βœ‡ WeLiveSecurity

FBI investigating apparent ISIS attacks on Western websites

β€” March 9th 2015 at 12:26
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.
β˜‘ β˜† βœ‡ WeLiveSecurity

DDoS attack on feminist blog backfires on International Women's Day

β€” March 9th 2015 at 11:04
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
β˜‘ β˜† βœ‡ WeLiveSecurity

Europol shuts down Ramnit botnet used to steal bank details

β€” February 26th 2015 at 12:37
The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.
β˜‘ β˜† βœ‡ WeLiveSecurity

Lenovo and Superfish? Don't panic, you may not be affected

β€” February 20th 2015 at 19:45
Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook exploit allowed attackers to remotely delete photos

β€” February 13th 2015 at 14:05
A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.
β˜‘ β˜† βœ‡ WeLiveSecurity

Electronic health records and data abuse: it's about more than medical info

β€” February 13th 2015 at 13:01
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
❌