Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
We Live Security
Page 3
We Live Security
We Live Security
Top tips to save energy used by your electronic devices
Top tips to save energy used by your electronic devices With the rapidly rising energy prices...
We Live Security
ScarCruft updates its toolset – Week in security with Tony Anscombe
ScarCruft updates its toolset – Week in security with Tony Anscombe Deployed against carefully selected targets,...
We Live Security
Tractors vs. threat actors: How to hack a farm
Tractors vs. threat actors: How to hack a farm Forget pests for a minute. Modern farms...
We Live Security
Fantasy – a new Agrius wiper deployed through a supply‑chain attack
Fantasy – a new Agrius wiper deployed through a supply‑chain attack ESET researchers analyzed a supply-chain...
We Live Security
Xenomorph: What to know about this Android banking trojan
Xenomorph: What to know about this Android banking trojan Xenomorph pilfers victims’ login credentials for banking,...
We Live Security
Diamond industry under attack – Week in security with Tony Anscombe
Diamond industry under attack – Week in security with Tony Anscombe ESET researchers uncover a new...
We Live Security
Cybersecurity Trends 2023: Securing our hybrid lives
Cybersecurity Trends 2023: Securing our hybrid lives ESET experts offer their reflections on what the continued...
We Live Security
Top tips for security‑ and privacy‑enhancing holiday gifts
Top tips for security‑ and privacy‑enhancing holiday gifts Think outside the (gift) box. Here are a...
We Live Security
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities ESET researchers discovered a spearphishing campaign targeting Japanese...
We Live Security
Traveling for the holidays? Stay cyber‑safe with these tips
Traveling for the holidays? Stay cyber‑safe with these tips Holiday travel is back with a vengeance...
We Live Security
Help! My kid has asked Santa for a smartphone
Help! My kid has asked Santa for a smartphone The time has come for your child...
We Live Security
MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe
MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe The group’s...
We Live Security
How to set up parental controls on your child’s new smartphone
How to set up parental controls on your child’s new smartphone Give yourself peace of mind...
We Live Security
‘Tis the season for gaming: Keeping children safe (and parents sane)
‘Tis the season for gaming: Keeping children safe (and parents sane) It’s all fun and games...
We Live Security
2022 in review: 10 of the year’s biggest cyberattacks
2022 in review: 10 of the year’s biggest cyberattacks The past year has seen no shortage...
We Live Security
Cybersecurity trends and challenges to look out for in 2023
Cybersecurity trends and challenges to look out for in 2023 What are some of the key...
We Live Security
The world’s most common passwords: What to do if yours is on the list
The world’s most common passwords: What to do if yours is on the list Do you...
We Live Security
Gaming: How much is too much for our children?
Gaming: How much is too much for our children? With many children spending a little too...
We Live Security
The doctor will see you now … virtually: Tips for a safe telehealth visit
The doctor will see you now … virtually: Tips for a safe telehealth visit Are your...
We Live Security
Ransomware target list – Week in security with Tony Anscombe
Ransomware target list – Week in security with Tony Anscombe Why schools, hospitals, local governments and...
We Live Security
Hybrid work: Turning business platforms into preferred social spaces
Hybrid work: Turning business platforms into preferred social spaces Hybrid work and hybrid play now merge...
We Live Security
Cracked it! Highlights from KringleCon 5: Golden Rings
Cracked it! Highlights from KringleCon 5: Golden Rings Learning meets fun at the 2022 SANS Holiday...
We Live Security
StrongPity espionage campaign targeting Android users
StrongPity espionage campaign targeting Android users ESET researchers identified an active StrongPity campaign distributing a trojanized...
We Live Security
Now you can legally repair your tech – sort of
Now you can legally repair your tech – sort of A new law portends a future...
We Live Security
Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit
Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit ESET Research announces IPyIDA 2.0, a Python...
We Live Security
Spyware posing as VPN apps – Week in security with Tony Anscombe
Spyware posing as VPN apps – Week in security with Tony Anscombe The Bahamut APT group...
We Live Security
Security fatigue is real: Here’s how to overcome it
Security fatigue is real: Here’s how to overcome it Do your employees take more risks with...
We Live Security
Bahamut cybermercenary group targets Android users with fake VPN apps
Bahamut cybermercenary group targets Android users with fake VPN apps Malicious apps used in this active...
We Live Security
Latest insights on APT activity – Week in security with Tony Anscombe
Latest insights on APT activity – Week in security with Tony Anscombe What have some of...
We Live Security
Tor vs. VPN: Which should you choose?
Tor vs. VPN: Which should you choose? Both Tor and a VPN can greatly help you...
Posts navigation
1
2
3
4
…
6
Latest News
The Hacker News
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources – Source:thehackernews.com
03/05/2024
The Hacker News
Google Announces Passkeys Adopted by Over 400 Million Accounts – Source:thehackernews.com
03/05/2024
Data Breach Today
Critical Flaw in R Language Poses Supply Chain Risk – Source: www.databreachtoday.com
03/05/2024
Data Breach Today
Correlating Cyber Investments With Business Outcomes – Source: www.databreachtoday.com
03/05/2024
Data Breach Today
Rehab Hospital Chain Hack Affects 101,000; Facing 6 Lawsuits – Source: www.databreachtoday.com
03/05/2024
Data Breach Today
Breach Roundup: REvil Hacker Gets Nearly 14-Year Sentence – Source: www.databreachtoday.com
03/05/2024