FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat Europe 2025: Was that device designed to be on the internet at all?

โ€” December 12th 2025 at 15:22
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat Europe 2025: Reputation matters โ€“ even in the ransomware economy

โ€” December 11th 2025 at 16:04
Being seen as reliable is good for โ€˜businessโ€™ and ransomware groups care about 'brand reputation' just as much as their victims
โ˜ โ˜† โœ‡ WeLiveSecurity

Locks, SOCs and a cat in a box: What Schrรถdinger can teach us about cybersecurity

โ€” December 11th 2025 at 10:00
If you donโ€™t look inside your environment, you canโ€™t know its true state โ€“ and attackers count on that
โ˜ โ˜† โœ‡ WeLiveSecurity

Seeking symmetry during ATT&CKยฎ season: How to harness todayโ€™s diverse analyst and tester landscape to paint a security masterpiece

โ€” December 10th 2025 at 15:03
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
โ˜ โ˜† โœ‡ WeLiveSecurity

The big catch: How whaling attacks target top executives

โ€” December 9th 2025 at 10:00
Is your organizationโ€™s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
โ˜ โ˜† โœ‡ WeLiveSecurity

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

โ€” December 4th 2025 at 10:00
Identity is effectively the new network boundary. It must be protected at all costs.
โ˜ โ˜† โœ‡ WeLiveSecurity

Oversharing is not caring: Whatโ€™s at stake if your employees post too much online

โ€” December 1st 2025 at 10:00
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
โ˜ โ˜† โœ‡ WeLiveSecurity

This month in security with Tony Anscombe โ€“ November 2025 edition

โ€” November 28th 2025 at 13:46
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news
โ˜ โ˜† โœ‡ WeLiveSecurity

What parents should know to protect their children from doxxing

โ€” November 27th 2025 at 10:00
Online disagreements among young people can easily spiral out of control. Parents need to understand whatโ€™s at stake.
โ˜ โ˜† โœ‡ WeLiveSecurity

Influencers in the crosshairs: How cybercriminals are targeting content creators

โ€” November 25th 2025 at 10:00
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
โ˜ โ˜† โœ‡ WeLiveSecurity

MDR is the answer โ€“ now, whatโ€™s the question?

โ€” November 24th 2025 at 10:00
Why your business needs the best-of-breed combination of technology and human expertise
โ˜ โ˜† โœ‡ WeLiveSecurity

The OSINT advantage: Find your weak spots before attackers do

โ€” November 20th 2025 at 10:00
Hereโ€™s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
โ˜ โ˜† โœ‡ WeLiveSecurity

What if your romantic AI chatbot canโ€™t keep a secret?

โ€” November 17th 2025 at 10:00
Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.
โ˜ โ˜† โœ‡ WeLiveSecurity

How password managers can be hacked โ€“ and how to stay safe

โ€” November 13th 2025 at 10:00
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
โ˜ โ˜† โœ‡ WeLiveSecurity

Why shadow AI could be your biggest security blind spot

โ€” November 11th 2025 at 10:00
From unintentional data leakage to buggy code, hereโ€™s why you should care about unsanctioned AI use in your company
โ˜ โ˜† โœ‡ WeLiveSecurity

In memoriam: David Harley

โ€” November 7th 2025 at 13:46
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
โ˜ โ˜† โœ‡ WeLiveSecurity

The who, where, and how of APT attacks in Q2 2025โ€“Q3 2025

โ€” November 7th 2025 at 12:34
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
โ˜ โ˜† โœ‡ WeLiveSecurity

How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)

โ€” November 4th 2025 at 10:00
Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you โ€“ and what you can do to stay one step ahead
โ˜ โ˜† โœ‡ WeLiveSecurity

Ground zero: 5 things to do after discovering a cyberattack

โ€” November 3rd 2025 at 10:00
When every minute counts, preparation and precision can mean the difference between disruption and disaster
โ˜ โ˜† โœ‡ WeLiveSecurity

This month in security with Tony Anscombe โ€“ October 2025 edition

โ€” October 31st 2025 at 10:00
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecurity right now
โ˜ โ˜† โœ‡ WeLiveSecurity

Cybersecurity Awareness Month 2025: When seeing isn't believing

โ€” October 29th 2025 at 10:00
Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams
โ˜ โ˜† โœ‡ WeLiveSecurity

Recruitment red flags: Can you spot a spy posing as a job seeker?

โ€” October 28th 2025 at 10:00
Hereโ€™s what to know about a recent spin on an insider threat โ€“ fake North Korean IT workers infiltrating western firms
โ˜ โ˜† โœ‡ WeLiveSecurity

How MDR can give MSPs the edge in a competitive market

โ€” October 27th 2025 at 10:00
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
โ˜ โ˜† โœ‡ WeLiveSecurity

Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows

โ€” October 24th 2025 at 11:53
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures
โ˜ โ˜† โœ‡ WeLiveSecurity

Cybersecurity Awareness Month 2025: Building resilience against ransomware

โ€” October 20th 2025 at 14:11
Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
โ˜ โ˜† โœ‡ WeLiveSecurity

Minecraft mods: Should you 'hack' your game?

โ€” October 16th 2025 at 09:00
Some Minecraft mods donโ€™t help build worlds โ€“ they break them. Hereโ€™s how malware can masquerade as a Minecraft mod.
โ˜ โ˜† โœ‡ WeLiveSecurity

IT service desks: The security blind spot that may put your business at risk

โ€” October 15th 2025 at 09:00
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Hereโ€™s how your team can close a growing security gap.
โ˜ โ˜† โœ‡ WeLiveSecurity

Cybersecurity Awareness Month 2025: Why software patching matters more than ever

โ€” October 14th 2025 at 14:21
As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.
โ˜ โ˜† โœ‡ WeLiveSecurity

AI-aided malvertising: Exploiting a chatbot to spread scams

โ€” October 13th 2025 at 09:00
Cybercriminals have tricked Xโ€™s AI chatbot into promoting phishing scams in a technique that has been nicknamed โ€œGrokkingโ€. Hereโ€™s what to know about it.
โ˜ โ˜† โœ‡ WeLiveSecurity

How Uber seems to know where you are โ€“ even with restricted location permissions

โ€” October 9th 2025 at 09:00
Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.
โ˜ โ˜† โœ‡ WeLiveSecurity

Cybersecurity Awareness Month 2025: Passwords alone are not enough

โ€” October 8th 2025 at 10:08
Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders.
โ˜ โ˜† โœ‡ WeLiveSecurity

The case for cybersecurity: Why successful businesses are built on protection

โ€” October 7th 2025 at 09:00
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
โ˜ โ˜† โœ‡ WeLiveSecurity

Manufacturing under fire: Strengthening cyber-defenses amid surging threats

โ€” October 3rd 2025 at 09:00
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
โ˜ โ˜† โœ‡ WeLiveSecurity

Cybersecurity Awareness Month 2025: Knowledge is power

โ€” October 1st 2025 at 14:49
We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals
โ˜ โ˜† โœ‡ WeLiveSecurity

This month in security with Tony Anscombe โ€“ September 2025 edition

โ€” September 29th 2025 at 10:00
The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans
โ˜ โ˜† โœ‡ WeLiveSecurity

Roblox executors: Itโ€™s all fun and games until someone gets hacked

โ€” September 26th 2025 at 09:00
You could be getting more than you bargained for when you download that cheat tool promising quick wins
โ˜ โ˜† โœ‡ WeLiveSecurity

Small businesses, big targets: Protecting your business against ransomware

โ€” September 18th 2025 at 09:00
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
โ˜ โ˜† โœ‡ WeLiveSecurity

HybridPetya: The Petya/NotPetya copycat comes with a twist

โ€” September 16th 2025 at 11:33
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
โ˜ โ˜† โœ‡ WeLiveSecurity

Are cybercriminals hacking your systems โ€“ or just logging in?

โ€” September 11th 2025 at 08:55
As bad actors often simply waltz through companiesโ€™ digital front doors with a key, hereโ€™s how to keep your own door locked tight
โ˜ โ˜† โœ‡ WeLiveSecurity

Preventing business disruption and building cyber-resilience with MDR

โ€” September 9th 2025 at 09:00
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
โ˜ โ˜† โœ‡ WeLiveSecurity

Under lock and key: Safeguarding business data with encryption

โ€” September 5th 2025 at 08:53
As the attack surface expands and the threat landscape grows more complex, itโ€™s time to consider whether your data protection strategy is fit for purpose
โ˜ โ˜† โœ‡ WeLiveSecurity

This month in security with Tony Anscombe โ€“ August 2025 edition

โ€” August 28th 2025 at 09:00
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
โ˜ โ˜† โœ‡ WeLiveSecurity

Donโ€™t let โ€œback to schoolโ€ become โ€œback to (cyber)bullyingโ€

โ€” August 27th 2025 at 09:00
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
โ˜ โ˜† โœ‡ WeLiveSecurity

"What happens online stays online" and other cyberbullying myths, debunked

โ€” August 21st 2025 at 09:00
Separating truth from fiction is the first step towards making better parenting decisions. Letโ€™s puncture some of the most common misconceptions about online harassment.
โ˜ โ˜† โœ‡ WeLiveSecurity

The need for speed: Why organizations are turning to rapid, trustworthy MDR

โ€” August 19th 2025 at 09:00
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
โ˜ โ˜† โœ‡ WeLiveSecurity

Supply-chain dependencies: Check your resilience blind spot

โ€” August 12th 2025 at 14:08
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
โ˜ โ˜† โœ‡ WeLiveSecurity

How the always-on generation can level up its cybersecurity game

โ€” August 12th 2025 at 09:00
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
โ˜ โ˜† โœ‡ WeLiveSecurity

WinRAR zero-day exploited in espionage attacks against high-value targets

โ€” August 11th 2025 at 18:18
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat USA 2025: Is a high cyber insurance premium about your risk, or your insurerโ€™s?

โ€” August 8th 2025 at 14:25
A sky-high premium may not always reflect your companyโ€™s security posture
โ˜ โ˜† โœ‡ WeLiveSecurity

Android adware: What is it, and how do I get it off my device?

โ€” August 8th 2025 at 09:00
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Hereโ€™s what to do.
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat USA 2025: Policy compliance and the myth of the silver bullet

โ€” August 7th 2025 at 16:03
Whoโ€™s to blame when the AI tool managing a companyโ€™s compliance status gets it wrong?
โ˜ โ˜† โœ‡ WeLiveSecurity

Black Hat USA 2025: Does successful cybersecurity today increase cyber-risk tomorrow?

โ€” August 7th 2025 at 14:23
Success in cybersecurity is when nothing happens, plus other standout themes from two of the eventโ€™s keynotes
โ˜ โ˜† โœ‡ WeLiveSecurity

Is your phone spying on you? | Unlocked 403 cybersecurity podcast (S2E5)

โ€” August 1st 2025 at 12:08
Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
โ˜ โ˜† โœ‡ WeLiveSecurity

Why the tech industry needs to stand firm on preserving end-to-end encryption

โ€” August 1st 2025 at 09:00
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
โ˜ โ˜† โœ‡ WeLiveSecurity

This month in security with Tony Anscombe โ€“ July 2025 edition

โ€” July 31st 2025 at 07:43
Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
โ˜ โ˜† โœ‡ WeLiveSecurity

The hidden risks of browser extensions โ€“ and how to stay safe

โ€” July 29th 2025 at 09:00
Not all browser add-ons are handy helpers โ€“ some may contain far more than you have bargained for
โ˜ โ˜† โœ‡ WeLiveSecurity

SharePoint under fire: ToolShell attacks hit organizations worldwide

โ€” July 25th 2025 at 07:28
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
โ˜ โ˜† โœ‡ WeLiveSecurity

Rogue CAPTCHAs: Look out for phony verification pages spreading malware

โ€” July 24th 2025 at 08:30
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
โ˜ โ˜† โœ‡ WeLiveSecurity

Why is your data worth so much? | Unlocked 403 cybersecurity podcast (S2E4)

โ€” July 22nd 2025 at 10:18
Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product.
โ˜ โ˜† โœ‡ WeLiveSecurity

How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)

โ€” July 4th 2025 at 09:40
Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.
โŒ