Quantcast
Channel: WeLiveSecurity

Cracking the 2023 SANS Holiday Hack Challenge

$
0
0
From ChatNPT to Game Boys and space apps, this year’s challenge took us to the Geese Islands for another rollicking romp of fun

Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe

$
0
0
What are some of the key cybersecurity trends that people and organizations should have on their radars this year?

Love is in the AI: Finding love online takes on a whole new meaning

$
0
0
Is AI companionship the future of not-so-human connection – and even the cure for loneliness?

Attack of the copycats: How fake messaging apps and app mods could bite you

$
0
0
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride.

A peek behind the curtain: How are sock puppet accounts used in OSINT?

$
0
0
How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks

Lessons from SEC's X account hack – Week in security with Tony Anscombe

$
0
0
The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack of SEC's X account right ahead of the much-anticipated decision about Bitcoin ETFs

The 7 deadly cloud security sins and how SMBs can do things better

$
0
0
By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk

Is Temu safe? What to know before you ‘shop like a billionaire’

$
0
0
Here are some scams you may encounter on the shopping juggernaut, plus a few simple steps you can take to help safeguard your data while bagging that irresistible deal

Virtual kidnapping: How to see through this terrifying scam

$
0
0
Phone fraud takes a frightening twist as fraudsters can tap into AI to cause serious emotional and financial damage to the victims

Why many CISOs consider quitting – Week in security with Tony Anscombe

$
0
0
The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings

NSPX30: A sophisticated AitM-enabled implant evolving since 2005

$
0
0
ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group we have named Blackwood

Break the fake: The race is on to stop AI voice cloning scams

$
0
0
As AI-powered voice cloning turbocharges imposter scams, we sit down with ESET’s Jake Moore to discuss how to hang up on ‘hi-fi’ scam calls – and what the future holds for deepfake detection

Assessing and mitigating supply chain cybersecurity risks

$
0
0
Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective supplier risk management

Blackwood hijacks software updates to deploy NSPX30 – Week in security with Tony Anscombe

$
0
0
The previously unknown threat actor used the implant to target Chinese and Japanese companies, as well as individuals in China, Japan, and the UK

Cyber: The Swiss army knife of tradecraft

$
0
0
In today’s digitally interconnected world, advanced cyber capabilities have become an exceptionally potent and versatile tool of tradecraft for nation-states and criminals alike

ESET takes part in global operation to disrupt the Grandoreiro banking trojan

$
0
0
ESET provided technical analysis, statistical information, known C&C servers and was able to get a glimpse of the victimology

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

$
0
0
An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android TV boxes

VajraSpy: A Patchwork of espionage apps

$
0
0
ESET researchers discovered several Android apps carrying VajraSpy, a RAT used by the Patchwork APT group

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

$
0
0
The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim’s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows

Could your Valentine be a scammer? How to avoid getting caught in a bad romance

$
0
0
With Valentine’s Day almost upon us, here’s some timely advice on how to prevent scammers from stealing more than your heart

Left to their own devices: Security for employees using personal devices for work

$
0
0
As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it

The buck stops here: Why the stakes are high for CISOs

$
0
0
Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

$
0
0
Called a "watershed year for ransomware", 2023 marked a reversal from the decline in ransomware payments observed in the previous year

The art of digital sleuthing: How digital forensics unlocks the truth

$
0
0
Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell

Deepfakes in the global election year of 2024: A weapon of mass deception?

$
0
0
As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern

All eyes on AI | Unlocked 403: A cybersecurity podcast

$
0
0
Artificial intelligence is on everybody’s lips these days, but there are also many misconceptions about what AI actually is and isn’t. We unpack the basics and examine AI's broader implications.

Cyber-insurance and vulnerability scanning – Week in security with Tony Anscombe

$
0
0
Here's how the results of vulnerability scans factor into decisions on cyber-insurance and how human intelligence comes into play in the assessment of such digital signals

Watching out for the fakes: How to spot online disinformation

$
0
0
Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes?

Everything you need to know about IP grabbers

$
0
0
You would never give your personal ID to random strangers, right? So why provide the ID of your computer? Unsuspecting users beware, IP grabbers do not ask for your permission.

Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war

$
0
0
A mix of PSYOPs, espionage and … fake Canadian pharmacies!

PSYOP campaigns targeting Ukraine – Week in security with Tony Anscombe

$
0
0
Coming in two waves, the campaign sought to demoralize Ukrainians and Ukrainian speakers abroad with disinformation messages about war-related subjects

Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses

$
0
0
Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor

10 things to avoid posting on social media – and why

$
0
0
Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.

Vulnerabilities in business VPNs under the spotlight

$
0
0
As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk

Deceptive AI content and 2024 elections – Week in security with Tony Anscombe

$
0
0
As the specter of AI-generated disinformation looms large, tech giants vow to crack down on fabricated content that could sway voters and disrupt elections taking place around the world this year

Irresistible: Hooks, habits and why you can’t put down your phone

$
0
0
Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices.

Top 10 scams targeting seniors – and how to keep your money safe

$
0
0
The internet can be a wonderful place. But it’s also awash with fraudsters targeting people who are susceptible to fraud.

Evasive Panda leverages Monlam Festival to target Tibetans

$
0
0
ESET researchers uncover strategic web compromise and supply-chain attacks targeting Tibetans

APT attacks taking aim at Tibetans – Week in security with Tony Anscombe

$
0
0
Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor

Election cybersecurity: Protecting the ballot box and building trust in election integrity

$
0
0
What cyberthreats could wreak havoc on elections this year and how worried should we as voters be about the integrity of our voting systems?

How to share sensitive files securely online

$
0
0
Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe

Threat intelligence explained | Unlocked 403: A cybersecurity podcast

$
0
0
We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats

Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe

$
0
0
Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023

A prescription for privacy protection: Exercise caution when using a mobile health app

$
0
0
Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your most sensitive data

Rescoms rides waves of AceCryptor spam

$
0
0
Insight into ESET telemetry statistics about AceCryptor in H2 2023 with a focus on Rescoms campaigns in European countries

Cybersecurity starts at home: Help your children stay safe online with open conversations

$
0
0
Struggle to know how to help children and teens stay safe in cyberspace? A good ol’ fashioned chat is enough to put them on the right track.

AceCryptor attacks surge in Europe – Week in security with Tony Anscombe

$
0
0
The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed the Rescoms RAT

Borrower beware: Common loan scams and how to avoid them

$
0
0
Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Here’s how to avoid being scammed when considering a loan.

Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

$
0
0
This rundown of 10 cyberattacks against the sports industry shows why every team needs to keep its eyes on the ball when it comes to cybersecurity

RDP remains a security concern – Week in security with Tony Anscombe

$
0
0
Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result





Latest Images