Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Welivesecurity.com
Welivesecurity.com
ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022
And that’s just the tip of the iceberg when it comes to the trends that defined...
Welivesecurity.com
One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe
With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as...
Welivesecurity.com
A year of wiper attacks in Ukraine
ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since...
Welivesecurity.com
WinorDLL64: A backdoor from the vast Lazarus arsenal?
The targeted region, and overlap in behavior and code, suggest the tool is used by the...
Welivesecurity.com
Writing like a boss with ChatGPT and how to get better at spotting phishing scams
It’s never been easier to write a convincing message that can trick you into handing over...
Welivesecurity.com
ESET SMB Digital Security Sentiment Report: The damaging effects of a breach
SMBs need to not only reduce their odds of being hit by an attack, but also...
Welivesecurity.com
Will ChatGPT start writing killer malware?
AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to...
Welivesecurity.com
Search ads abused to spread malware – Week in security with Tony Anscombe
Threat actors used search engine ads to impersonate makers of popular software and direct internet users...
Welivesecurity.com
Security amidst a global frost
No longer relegated to a side-show, tech is embedded into virtually every new piece of gear...
Welivesecurity.com
These aren’t the apps you’re looking for: fake installers targeting Southeast and East Asia
ESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT malware, distributed via...
Welivesecurity.com
10 signs that scammers have you in their sights
Don’t be their next victim – here’s a handy round-up of some the most common signs...
Welivesecurity.com
ChatGPT, will you be my Valentine?
Spoiler alert: it turned me down. But that’s far from the only thing I learned while...
Welivesecurity.com
Confident cybersecurity means fewer headaches for SMBs
Small and medium-sized businesses have good reason to be concerned about the loss of data and...
Welivesecurity.com
Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe
What is behind the drop in ransomware and what should still be done for containing the...
Welivesecurity.com
Alexa, who else is listening?
Your smart speaker is designed to listen, but could it be eavesdropping too? Ever since Amazon...
Welivesecurity.com
ESET Threat Report T3 2022
A view of the T3 2022 threat landscape as seen by ESET telemetry and from the...
Welivesecurity.com
Into the void: Your tech and security in digital darkness
No internet, perfect security? Two ESET researchers perform a thought experiment where they consider the implications...
Welivesecurity.com
Online safety laws: What’s in store for children’s digital playgrounds?
As children’s safety and privacy online becomes a matter of increasing urgency, lawmakers around the world...
Welivesecurity.com
Avoiding data backup failures – Week in security with Tony Anscombe
Today is World Backup Day, but maybe we also need a “did you test your backups”...
Welivesecurity.com
World Backup Day: Avoiding a data disaster is a forever topic
By failing to prepare you are preparing to fail. Make sure you’re able to bounce back...
Welivesecurity.com
ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine
ESET experts share their insights on the cyber-elements of the first year of the war in...
Welivesecurity.com
Pig butchering scams: The anatomy of a fast‑growing threat
How fraudsters groom their marks and move in for the kill using tricks from the playbooks...
Welivesecurity.com
Staying safe on OnlyFans: The naked truth
How content creators and subscribers can embrace the social media platform without (overly) exposing themselves to...
Welivesecurity.com
Highlights from TikTok CEO’s Congress grilling – Week in security with Tony Anscombe
Here are some of the key moments from the five hours of Shou Zi Chew’s testimony...
Welivesecurity.com
What TikTok knows about you – and what you should know about TikTok
As TikTok CEO attempts to placate U.S. lawmakers, it’s time for us all to think about...
Welivesecurity.com
Twitter ends free SMS 2FA: Here’s how you can protect your account now
Twitter’s ditching of free text-message authentication doesn’t mean that you should forgo using 2FA. Instead, switch...
Welivesecurity.com
Banking turmoil opens opportunities for fraud – Week in security with Tony Anscombe
Scammers are looking to cash in on the chaos that has set in following the startling...
Welivesecurity.com
SVB’s collapse is a scammer’s dream: Don’t get caught out
How cybercriminals can exploit Silicon Valley Bank’s downfall for their own ends – and at your...
Welivesecurity.com
Not‑so‑private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets
ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR...
Welivesecurity.com
The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia
ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East...
Posts navigation
1
…
23
24
25
Latest News
CSO - Online
So entgiften Sie Ihre Sicherheitskultur – Source: www.csoonline.com
19/12/2024
CSO - Online
Top security solutions being piloted today — and how to do it right – Source: www.csoonline.com
19/12/2024
CSO - Online
Die 10 häufigsten LLM-Schwachstellen – Source: www.csoonline.com
19/12/2024
CSO - Online
Sehr geehrter CEO, – Source: www.csoonline.com
19/12/2024
CSO - Online
European authorities say AI can use personal data without consent for training – Source: www.csoonline.com
19/12/2024
securelist.com
Attackers exploiting a patched FortiClient EMS vulnerability in the wild – Source: securelist.com
19/12/2024