FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – June 2025 edition

β€” June 28th 2025 at 07:52
From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Don’t let dormant accounts become a doorway for cybercriminals

β€” June 2nd 2025 at 09:00
Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – May 2025 edition

β€” May 30th 2025 at 09:00
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Danabot under the microscope

β€” May 23rd 2025 at 11:43
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure
☐ β˜† βœ‡ WeLiveSecurity

Lumma Stealer: Down for the count

β€” May 22nd 2025 at 14:53
The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies
☐ β˜† βœ‡ WeLiveSecurity

The who, where, and how of APT attacks in Q4 2024–Q1 2025

β€” May 19th 2025 at 17:17
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report
☐ β˜† βœ‡ WeLiveSecurity

Sednit abuses XSS flaws to hit gov't entities, defense companies

β€” May 15th 2025 at 13:15
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU
☐ β˜† βœ‡ WeLiveSecurity

How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)

β€” May 12th 2025 at 09:00
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.
☐ β˜† βœ‡ WeLiveSecurity

RSAC 2025 wrap-up – Week in security with Tony Anscombe

β€” May 2nd 2025 at 14:16
From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – April 2025 edition

β€” April 29th 2025 at 11:43
From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity
☐ β˜† βœ‡ WeLiveSecurity

How safe and secure is your iPhone really?

β€” April 28th 2025 at 09:47
Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
☐ β˜† βœ‡ WeLiveSecurity

Deepfake 'doctors' take to TikTok to peddle bogus cures

β€” April 25th 2025 at 09:00
Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements
☐ β˜† βœ‡ WeLiveSecurity

Will super-smart AI be attacking us anytime soon?

β€” April 22nd 2025 at 09:00
What practical AI attacks exist today? β€œMore than zero” is the answer – and they’re getting better.
☐ β˜† βœ‡ WeLiveSecurity

Attacks on the education sector are surging: How can cyber-defenders respond?

β€” April 14th 2025 at 09:00
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?
☐ β˜† βœ‡ WeLiveSecurity

Watch out for these traps lurking in search results

β€” April 10th 2025 at 09:00
Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results
☐ β˜† βœ‡ WeLiveSecurity

So your friend has been hacked: Could you be next?

β€” April 9th 2025 at 09:00
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
☐ β˜† βœ‡ WeLiveSecurity

1 billion reasons to protect your identity online

β€” April 8th 2025 at 09:00
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.
☐ β˜† βœ‡ WeLiveSecurity

The good, the bad and the unknown of AI: A Q&A with MΓ‘ria BielikovΓ‘

β€” April 3rd 2025 at 09:00
The computer scientist and AI researcher shares her thoughts on the technology’s potential and pitfalls – and what may lie ahead for us
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – March 2025 edition

β€” March 31st 2025 at 10:46
From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it's a wrap on another month filled with impactful cybersecurity news
☐ β˜† βœ‡ WeLiveSecurity

Resilience in the face of ransomware: A key to business survival

β€” March 31st 2025 at 09:00
Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage
☐ β˜† βœ‡ WeLiveSecurity

Making it stick: How to get the most out of cybersecurity training

β€” March 28th 2025 at 10:00
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill β€˜sticky’ habits that will kick in when a danger is near
☐ β˜† βœ‡ WeLiveSecurity

RansomHub affiliates linked to rival RaaS gangs

β€” March 27th 2025 at 13:10
ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR security solutions
☐ β˜† βœ‡ WeLiveSecurity

FamousSparrow resurfaces to spy on targets in the US, Latin America

β€” March 27th 2025 at 10:42
Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first time
☐ β˜† βœ‡ WeLiveSecurity

MirrorFace updates toolset, expands targeting to Europe

β€” March 18th 2025 at 15:45
The group's Operation AkaiRyΕ« begins with targeted spearphishing emails that use the upcoming World Expo 2025 in Osaka, Japan, as a lure
☐ β˜† βœ‡ WeLiveSecurity

AI's biggest surprises of 2024 | Unlocked 403 cybersecurity podcast (S2E1)

β€” March 17th 2025 at 10:00
Here's what's been hot on the AI scene over the past 12 months, how it's changing the face of warfare, and how you can fight AI-powered scams
☐ β˜† βœ‡ WeLiveSecurity

When IT meets OT: Cybersecurity for the physical world

β€” March 14th 2025 at 10:00
While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT threat
☐ β˜† βœ‡ WeLiveSecurity

Don’t let cybercriminals steal your Spotify account

β€” March 11th 2025 at 10:00
Listen up, this is sure to be music to your ears – a few minutes spent securing your account today can save you a ton of trouble tomorrow
☐ β˜† βœ‡ WeLiveSecurity

AI-driven deception: A new face of corporate fraud

β€” March 10th 2025 at 10:00
Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses
☐ β˜† βœ‡ WeLiveSecurity

Kids behaving badly online? Here's what parents can do

β€” March 5th 2025 at 10:00
By taking time to understand and communicate the impact of undesirable online behavior, you can teach your kids an invaluable set of life lessons for a new digital age
☐ β˜† βœ‡ WeLiveSecurity

Martin Rees: Post-human intelligence – a cosmic perspective | Starmus highlights

β€” March 3rd 2025 at 10:00
Take a moment to think beyond our current capabilities and consider what might come next in the grand story of evolution
☐ β˜† βœ‡ WeLiveSecurity

Bernhard Schölkopf: Is AI intelligent? | Starmus highlights

β€” February 27th 2025 at 10:00
With AI's pattern recognition capabilities well-established, Mr. SchΓΆlkopf's talk shifts the focus to a pressing question: what will be the next great leap for AI?
☐ β˜† βœ‡ WeLiveSecurity

This month in security with Tony Anscombe – February 2025 edition

β€” February 26th 2025 at 10:00
Ransomware payments trending down, the cyber-resilience gap facing SMBs, and APT groups embracing generative AI – it's a wrap on another month filled with impactful security news
☐ β˜† βœ‡ WeLiveSecurity

Laurie Anderson: Building an ARK | Starmus highlights

β€” February 24th 2025 at 10:00
The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times
β˜‘ β˜† βœ‡ WeLiveSecurity

Operating System Vulnerabilities, Exploits and Insecurity

β€” March 10th 2015 at 13:40
iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.
β˜‘ β˜† βœ‡ WeLiveSecurity

FBI investigating apparent ISIS attacks on Western websites

β€” March 9th 2015 at 12:26
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator.
β˜‘ β˜† βœ‡ WeLiveSecurity

DDoS attack on feminist blog backfires on International Women's Day

β€” March 9th 2015 at 11:04
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile.
β˜‘ β˜† βœ‡ WeLiveSecurity

Europol shuts down Ramnit botnet used to steal bank details

β€” February 26th 2015 at 12:37
The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.
β˜‘ β˜† βœ‡ WeLiveSecurity

Lenovo and Superfish? Don't panic, you may not be affected

β€” February 20th 2015 at 19:45
Lenovo's installation of a security-breaking app called Superfish on some computers has customers justifiably angry, but some folks are now unnecessarily confused by false positive detection.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook exploit allowed attackers to remotely delete photos

β€” February 13th 2015 at 14:05
A Facebook hack that allowed attackers to remotely delete any photo they wanted to from the social network has been patched by the company.
β˜‘ β˜† βœ‡ WeLiveSecurity

Electronic health records and data abuse: it's about more than medical info

β€” February 13th 2015 at 13:01
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook launches ThreatExchange for companies to share security threats

β€” February 12th 2015 at 12:17
Facebook has officially launched ThreatExchange - a collaborative social network where companies can share information on cybersecurity threats, in an effort to neuter potential damage.
β˜‘ β˜† βœ‡ WeLiveSecurity

Security terms explained: What does Zero Day mean?

β€” February 11th 2015 at 18:22
One of the terms I’m most often asked to explain is what a β€œzero day” vulnerability or exploit is; let’s look at what that phrase entails.
β˜‘ β˜† βœ‡ WeLiveSecurity

WhatsApp privacy is 'broken,' reveals proof-of-concept hack

β€” February 10th 2015 at 14:00
WhatsApp's privacy settings are "broken" and can be bypassed by downloading a simple bit of software, claims the Dutch developer behind proof-of-concept tool WhatsSpy Public.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook turns 11 - what you need to know, and what do your likes say about you?

β€” February 4th 2015 at 10:30
Facebook updated its privacy settings at the end of January. As Facebook turns 11 today, here’s what you need to know about the new settings and how they could affect you.
β˜‘ β˜† βœ‡ WeLiveSecurity

White House seeks 10% increase in cybersecurity spend

β€” February 3rd 2015 at 17:28
President Obama's budget proposal for the 2016 fiscal year includes a projected 10 percent increase in cybersecurity spend, reports Reuters.
β˜‘ β˜† βœ‡ WeLiveSecurity

The New Hacker's List and an Old Debate: Would you Hire a Hacker?

β€” February 3rd 2015 at 14:03
The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook porn scam infects 110k users in 48 hours

β€” February 2nd 2015 at 12:42
A new porn scam is spreading startlingly quickly through Facebook - one that has managed to spread malware to over 110,000 users in 48 hours, reports The Guardian.
β˜‘ β˜† βœ‡ WeLiveSecurity

Taylor Swift hacked, but denies naked pictures will be leaked

β€” January 28th 2015 at 13:54
Singer Taylor Swift has had her Twitter and Instagram accounts hacked, but laughed off claims that the hackers will release nude photographs of her.
β˜‘ β˜† βœ‡ WeLiveSecurity

Android Wi-Fi Direct bug means hackers can reboot your device

β€” January 27th 2015 at 14:28
A vulnerability in Android's Wi-Fi Direct functionality has been uncovered by security researchers.
β˜‘ β˜† βœ‡ WeLiveSecurity

Edward Snowden doesn't use an iPhone for privacy reasons

β€” January 23rd 2015 at 14:18
NSA whistleblower Edward Snowden has claimed he doesn't use an iPhone for fear of surveillance technology in the smartphone, reports The Independent.
β˜‘ β˜† βœ‡ WeLiveSecurity

Blackhat: Lessons from the Michael Mann, Chris Hemsworth movie?

β€” January 23rd 2015 at 13:26
Blackhat, the hacker movie directed by Michael Mann and starring Chris Hemsworth, could spread awareness of digital threats. If it is a learning opportunity, what are the lessons?
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook will highlight hoaxes in users' newsfeeds

β€” January 21st 2015 at 12:11
Facebook has announced plans to crack down on spam and hoaxes in the newsfeed, with a note highlighting 'false information' when enough people flag the link as a hoax.
β˜‘ β˜† βœ‡ WeLiveSecurity

Cybercrime deterrence: 6 important steps

β€” January 20th 2015 at 02:50
Cybercrime: there's too much of it, and we need to do more to deter it. With the President of the United States now making frequent references to "doing more about cybercrime" now is a good time to look at what steps must be taken.
β˜‘ β˜† βœ‡ WeLiveSecurity

Lizard Squad DDoS-for-hire service hacked - users' details revealed

β€” January 19th 2015 at 00:29
Lizard Squad failed to encrypt its database of LizardStresser's registered users - storing details of their usernames and passwords in plaintext. A schoolboy error if ever I heard one.
β˜‘ β˜† βœ‡ WeLiveSecurity

Swiss bank data released by hackers

β€” January 14th 2015 at 14:14
The Swiss state owned Banque Cantonale de Geneve has confirmed that hackers have released confidential customer correspondences after the bank refused to pay the ransom demanded by the attackers
β˜‘ β˜† βœ‡ WeLiveSecurity

Hacked routers used for paid DDoS attacks

β€” January 13th 2015 at 15:09
The rent-a-DDoS service that knocked out Xbox Live and Playstation Network is powered by thousands of hacked residential internet routers.
β˜‘ β˜† βœ‡ WeLiveSecurity

British Prime Minister wants access to messaging apps

β€” January 13th 2015 at 14:10
British Prime Minister David Cameron has stated his belief that encrypted messaging services must have backdoor access to government agencies
β˜‘ β˜† βœ‡ WeLiveSecurity

'Critical Security Updates' cancelled for 939 million Android users

β€” January 12th 2015 at 16:53
Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software
β˜‘ β˜† βœ‡ WeLiveSecurity

Digital Invasion: 3 things we learned from CES 2015

β€” January 9th 2015 at 12:47
Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? There’s an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.
β˜‘ β˜† βœ‡ WeLiveSecurity

Facebook privacy - why statements about copyright don't do anything

β€” January 9th 2015 at 11:24
Facebook users around the world have reported the return of the network’s longer-lasting hoaxes - a legal disclaimer which allows users to regain copyright over their images and other content. Here's why it doesn't work.
❌