<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <title>WeLiveSecurity</title>
    <link>https://www.welivesecurity.com</link>
    <language>en</language>
    <description>WeLiveSecurity</description>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/digital-assets-death-managing-risks-your-loved-ones-digital-estate/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/digital-assets-death-managing-risks-your-loved-ones-digital-estate/</guid>
      <title>Digital assets after death: Managing risks to your loved one’s digital estate</title>
      <description>Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.</description>
      <pubDate>Wed, 01 Apr 2026 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/digital-estate.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-march-2026/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-march-2026/</guid>
      <title>This month in security with Tony Anscombe – March 2026 edition</title>
      <description>The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan</description>
      <pubDate>Tue, 31 Mar 2026 08:27:18 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/month-security-march.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/rsac-2026-wrap-up-week-security-tony-anscombe/</link>
      <guid>https://www.welivesecurity.com/en/videos/rsac-2026-wrap-up-week-security-tony-anscombe/</guid>
      <title>RSAC 2026 wrap-up – Week in security with Tony Anscombe</title>
      <description>This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with</description>
      <pubDate>Fri, 27 Mar 2026 10:38:21 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/silver-fox/rsac-2026-wrap-up.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/cunning-predator-how-silver-fox-preys-japanese-firms-tax-season/</link>
      <guid>https://www.welivesecurity.com/en/business-security/cunning-predator-how-silver-fox-preys-japanese-firms-tax-season/</guid>
      <title>A cunning predator: How Silver Fox preys on Japanese firms this tax season</title>
      <description>Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them</description>
      <pubDate>Fri, 27 Mar 2026 07:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/silver-fox/silver-fox-campaign-japan.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/virtual-machines-virtually-everywhere-real-security-gaps/</link>
      <guid>https://www.welivesecurity.com/en/business-security/virtual-machines-virtually-everywhere-real-security-gaps/</guid>
      <title>Virtual machines, virtually everywhere – and with real security gaps</title>
      <description>Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to fend for themselves</description>
      <pubDate>Wed, 25 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/virtual-machines-security.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/cloud-workload-security-mind-gaps/</link>
      <guid>https://www.welivesecurity.com/en/business-security/cloud-workload-security-mind-gaps/</guid>
      <title>Cloud workload security: Mind the gaps</title>
      <description>As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning</description>
      <pubDate>Tue, 24 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/cloud-workloads-1.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/move-fast-save-things-quick-guide-recovering-hacked-account/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/move-fast-save-things-quick-guide-recovering-hacked-account/</guid>
      <title>Move fast and save things: A quick guide to recovering a hacked account</title>
      <description>What you do – and how fast – after an account is compromised often matters more than it may seem</description>
      <pubDate>Fri, 20 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/hacked-accounts-recovery.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/</guid>
      <title>EDR killers explained: Beyond the drivers</title>
      <description>ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers</description>
      <pubDate>Thu, 19 Mar 2026 09:55:08 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/edr-killers/malware-edr-killers-ransomware.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/face-value-what-takes-fool-facial-recognition/</link>
      <guid>https://www.welivesecurity.com/en/privacy/face-value-what-takes-fool-facial-recognition/</guid>
      <title>Face value: What it takes to fool facial recognition</title>
      <description>ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026</description>
      <pubDate>Fri, 13 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/rsac2026-jake-moore.jpg</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/cyber-fallout-iran-war-what-have-radar/</link>
      <guid>https://www.welivesecurity.com/en/business-security/cyber-fallout-iran-war-what-have-radar/</guid>
      <title>Cyber fallout from the Iran war: What to have on your radar</title>
      <description>The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.</description>
      <pubDate>Thu, 12 Mar 2026 14:17:33 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/iran-war-cyber-risks.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/</guid>
      <title>Sednit reloaded: Back in the trenches</title>
      <description>The resurgence of one of Russia’s most notorious APT groups</description>
      <pubDate>Tue, 10 Mar 2026 09:58:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/sednit-reloaded/sednit-apt-group-beardshell-covenant.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/what-cybersecurity-actually-does-for-your-business/</link>
      <guid>https://www.welivesecurity.com/en/business-security/what-cybersecurity-actually-does-for-your-business/</guid>
      <title>What cybersecurity actually does for your business</title>
      <description>The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed</description>
      <pubDate>Fri, 06 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/business-cybersecurity-value.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/how-smbs-use-threat-research-mdr-build-defensive-edge/</link>
      <guid>https://www.welivesecurity.com/en/business-security/how-smbs-use-threat-research-mdr-build-defensive-edge/</guid>
      <title>How SMBs use threat research and MDR to build a defensive edge</title>
      <description>We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses</description>
      <pubDate>Thu, 05 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/jean-ian-boutin.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/protecting-education-how-mdr-can-tip-balance-favor-schools/</link>
      <guid>https://www.welivesecurity.com/en/business-security/protecting-education-how-mdr-can-tip-balance-favor-schools/</guid>
      <title>Protecting education: How MDR can tip the balance in favor of schools</title>
      <description>The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?</description>
      <pubDate>Wed, 04 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/mdr-protecting-education.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-february-2026/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-february-2026/</guid>
      <title>This month in security with Tony Anscombe – February 2026 edition</title>
      <description>In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools</description>
      <pubDate>Sat, 28 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/tony-thumb-smaller-copy-1.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/mobile-security/mobile-app-permissions-still-matter-more-think/</link>
      <guid>https://www.welivesecurity.com/en/mobile-security/mobile-app-permissions-still-matter-more-think/</guid>
      <title>Mobile app permissions (still) matter more than you may think</title>
      <description>Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks.</description>
      <pubDate>Fri, 27 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/app-permissions.png</image>
      <category>Mobile Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/faking-it-phone-how-tell-voice-call-ai/</link>
      <guid>https://www.welivesecurity.com/en/business-security/faking-it-phone-how-tell-voice-call-ai/</guid>
      <title>Faking it on the phone: How to tell if a voice call is AI or not</title>
      <description>Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.</description>
      <pubDate>Mon, 23 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/deepfake-calls-voice-cloning.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/</guid>
      <title>PromptSpy ushers in the era of Android threats using GenAI</title>
      <description>ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow</description>
      <pubDate>Thu, 19 Feb 2026 10:30:20 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/promptspy/promptspy-gemini-genai-malware.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/poshmark-safe-buy-sell-scammed/</link>
      <guid>https://www.welivesecurity.com/en/scams/poshmark-safe-buy-sell-scammed/</guid>
      <title>Is Poshmark safe? How to buy and sell without getting scammed</title>
      <description>Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.</description>
      <pubDate>Thu, 19 Feb 2026 07:21:48 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/poshmark.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/children-selfies-online/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/children-selfies-online/</guid>
      <title>Is it OK to let your children post selfies online?</title>
      <description>When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.</description>
      <pubDate>Tue, 17 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/children-selfies.jpg</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/ransomware/naming-shaming-ransomware-groups-tighten-screws-victims/</link>
      <guid>https://www.welivesecurity.com/en/ransomware/naming-shaming-ransomware-groups-tighten-screws-victims/</guid>
      <title>Naming and shaming: How ransomware groups tighten the screws on victims</title>
      <description>When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle</description>
      <pubDate>Thu, 12 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/data-leak-sites-ransomware.png</image>
      <category>Ransomware</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/taxing-times-top-irs-scams-look-out-2026/</link>
      <guid>https://www.welivesecurity.com/en/scams/taxing-times-top-irs-scams-look-out-2026/</guid>
      <title>Taxing times: Top IRS scams to look out for in 2026</title>
      <description>It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.</description>
      <pubDate>Tue, 10 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/tax-scams-irs-fraud.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/offerup-scammers-out-force-heres-what-you-should-know/</link>
      <guid>https://www.welivesecurity.com/en/scams/offerup-scammers-out-force-heres-what-you-should-know/</guid>
      <title>OfferUp scammers are out in force: Here’s what you should know</title>
      <description>The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.</description>
      <pubDate>Wed, 04 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/offerup-scams-fraud.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/slippery-slope-winter-olympics-scams-cyberthreats/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/slippery-slope-winter-olympics-scams-cyberthreats/</guid>
      <title>A slippery slope: Beware of Winter Olympics scams and other cyberthreats</title>
      <description>It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.</description>
      <pubDate>Mon, 02 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/winter-olympics-scams-threats.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-january-2026-edition/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-january-2026-edition/</guid>
      <title>This month in security with Tony Anscombe – January 2026 edition</title>
      <description>The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year</description>
      <pubDate>Fri, 30 Jan 2026 15:20:16 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/tony-month-security-news-roundup.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/</guid>
      <title>DynoWiper update: Technical analysis and attribution</title>
      <description>ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector</description>
      <pubDate>Fri, 30 Jan 2026 10:28:38 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/dynowiper/dynowiper-poland-energy-sector-cyberattack.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/love-actually-fake-dating-app-used-lure-targeted-spyware-campaign-pakistan/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/love-actually-fake-dating-app-used-lure-targeted-spyware-campaign-pakistan/</guid>
      <title>Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan</title>
      <description>ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation</description>
      <pubDate>Wed, 28 Jan 2026 09:59:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/love-actually/pakistan-romance-scam.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/drowning-spam-scam-emails-why/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/drowning-spam-scam-emails-why/</guid>
      <title>Drowning in spam or scam emails? Here’s probably why</title>
      <description>Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.</description>
      <pubDate>Tue, 27 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/scam-spam-emails.jpg</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/</guid>
      <title>ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025</title>
      <description>The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper</description>
      <pubDate>Fri, 23 Jan 2026 16:58:26 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/sandworm-poland-attack.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/children-chatbots-what-parents-should-know/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/children-chatbots-what-parents-should-know/</guid>
      <title>Children and chatbots: What parents should know</title>
      <description>As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development</description>
      <pubDate>Fri, 23 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/children-chatbots-privacy-security-risks.jpg</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/common-apple-pay-scams-how-stay-safe/</link>
      <guid>https://www.welivesecurity.com/en/scams/common-apple-pay-scams-how-stay-safe/</guid>
      <title>Common Apple Pay scams, and how to stay safe</title>
      <description>Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead</description>
      <pubDate>Thu, 22 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/apple-pay-scams.jpg</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/old-habits-die-hard-2025-most-common-passwords/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/old-habits-die-hard-2025-most-common-passwords/</guid>
      <title>Old habits die hard: 2025’s most common passwords were as predictable as ever</title>
      <description>Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well</description>
      <pubDate>Tue, 20 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/passwords-2025/contrasena-mas-usadas-2025.jpg</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/social-media/linkedin-hunting-ground-threat-actors-how-protect-yourself/</link>
      <guid>https://www.welivesecurity.com/en/social-media/linkedin-hunting-ground-threat-actors-how-protect-yourself/</guid>
      <title>Why LinkedIn is a hunting ground for threat actors – and how to protect yourself</title>
      <description>The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.</description>
      <pubDate>Fri, 16 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/linkedin-cyberattacks-social-engineering.png</image>
      <category>Social Media</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/social-media/time-internet-services-adopt-identity-verification/</link>
      <guid>https://www.welivesecurity.com/en/social-media/time-internet-services-adopt-identity-verification/</guid>
      <title>Is it time for internet services to adopt identity verification?</title>
      <description>Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.</description>
      <pubDate>Wed, 14 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/internet-verification.png</image>
      <category>Social Media</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/information-dark-web-what-happens-next/</link>
      <guid>https://www.welivesecurity.com/en/privacy/information-dark-web-what-happens-next/</guid>
      <title>Your personal information is on the dark web. What happens next?</title>
      <description>If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.</description>
      <pubDate>Tue, 13 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/dark-web-personal-information-data.jpg</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/credential-stuffing-what-it-is-how-protect-yourself/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/credential-stuffing-what-it-is-how-protect-yourself/</guid>
      <title>Credential stuffing: What it is and how to protect yourself</title>
      <description>Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts</description>
      <pubDate>Thu, 08 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/password-habits.jpg</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-december-2025/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-december-2025/</guid>
      <title>This month in security with Tony Anscombe – December 2025 edition</title>
      <description>As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year</description>
      <pubDate>Mon, 29 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/tony-anscombe-monthly-video-december.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/brush-online-fraud-what-are-brushing-scams-how-do-i-stay-safe/</link>
      <guid>https://www.welivesecurity.com/en/scams/brush-online-fraud-what-are-brushing-scams-how-do-i-stay-safe/</guid>
      <title>A brush with online fraud: What are brushing scams and how do I stay safe?</title>
      <description>Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.</description>
      <pubDate>Tue, 23 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/brushing-scam.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/</guid>
      <title>Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component</title>
      <description>A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation</description>
      <pubDate>Mon, 22 Dec 2025 09:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/cve-2025-50165/cve-2025-50165-windows-imaging-component-vulnerability.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/</guid>
      <title>LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan</title>
      <description>ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions</description>
      <pubDate>Thu, 18 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/longnosedgoblin/eset-threat-research-longnosed-goblin-southeast-asia-japan.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2025/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2025/</guid>
      <title>ESET Threat Report H2 2025</title>
      <description>A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts</description>
      <pubDate>Tue, 16 Dec 2025 09:50:45 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/eset-threat-report-h2-2025.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/internet-of-things/black-hat-europe-2025-device-designed-internet/</link>
      <guid>https://www.welivesecurity.com/en/internet-of-things/black-hat-europe-2025-device-designed-internet/</guid>
      <title>Black Hat Europe 2025: Was that device designed to be on the internet at all?</title>
      <description>Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found</description>
      <pubDate>Fri, 12 Dec 2025 15:22:52 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/black-hat-europe-buildings-ics-siegeware.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/black-hat-europe-2025-reputation-ransomware/</link>
      <guid>https://www.welivesecurity.com/en/business-security/black-hat-europe-2025-reputation-ransomware/</guid>
      <title>Black Hat Europe 2025: Reputation matters – even in the ransomware economy</title>
      <description>Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims</description>
      <pubDate>Thu, 11 Dec 2025 16:04:19 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/ransomware-raas-reputation.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/locks-socs-cat-box-what-schrodinger-can-teach-us-about-cybersecurity/</link>
      <guid>https://www.welivesecurity.com/en/business-security/locks-socs-cat-box-what-schrodinger-can-teach-us-about-cybersecurity/</guid>
      <title>Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity</title>
      <description>If you don’t look inside your environment, you can’t know its true state – and attackers count on that</description>
      <pubDate>Thu, 11 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/cat-schrodinger.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/seeking-symmetry-attck-season-harness-todays-diverse-analyst-tester-landscape-paint-security-masterpiece/</link>
      <guid>https://www.welivesecurity.com/en/business-security/seeking-symmetry-attck-season-harness-todays-diverse-analyst-tester-landscape-paint-security-masterpiece/</guid>
      <title>Seeking symmetry during ATT&amp;CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece</title>
      <description>Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.</description>
      <pubDate>Wed, 10 Dec 2025 15:03:51 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/mitre-attack-evaluation.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/big-catch-how-whaling-attacks-target-top-executives/</link>
      <guid>https://www.welivesecurity.com/en/business-security/big-catch-how-whaling-attacks-target-top-executives/</guid>
      <title>The big catch: How whaling attacks target top executives</title>
      <description>Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.</description>
      <pubDate>Tue, 09 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/executives.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/phishing-privileges-passwords-identity-cybersecurity-posture/</link>
      <guid>https://www.welivesecurity.com/en/business-security/phishing-privileges-passwords-identity-cybersecurity-posture/</guid>
      <title>Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture</title>
      <description>Identity is effectively the new network boundary. It must be protected at all costs.</description>
      <pubDate>Thu, 04 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/phishing-privileges-and-passwords.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/</guid>
      <title>MuddyWater: Snakes by the riverbank</title>
      <description>MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook</description>
      <pubDate>Tue, 02 Dec 2025 10:00:15 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/muddywater/muddywater-eset-threat-research.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/oversharing-is-not-caring-stake-employees-post-too-much-online/</link>
      <guid>https://www.welivesecurity.com/en/business-security/oversharing-is-not-caring-stake-employees-post-too-much-online/</guid>
      <title>Oversharing is not caring: What’s at stake if your employees post too much online</title>
      <description>From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.</description>
      <pubDate>Mon, 01 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/oversharing-social-media-employees.jpg</image>
      <category>Social Media</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-november-2025/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-november-2025/</guid>
      <title>This month in security with Tony Anscombe – November 2025 edition</title>
      <description>Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news</description>
      <pubDate>Fri, 28 Nov 2025 13:46:36 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/cybersecurity-news-tony-anscombe-thumbnail.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/parents-protect-children-doxxing/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/parents-protect-children-doxxing/</guid>
      <title>What parents should know to protect their children from doxxing</title>
      <description>Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.</description>
      <pubDate>Thu, 27 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/doxxing-children.jpg</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/social-media/influencers-crosshairs-cybercriminals-targeting-content-creators/</link>
      <guid>https://www.welivesecurity.com/en/social-media/influencers-crosshairs-cybercriminals-targeting-content-creators/</guid>
      <title>Influencers in the crosshairs: How cybercriminals are targeting content creators</title>
      <description>Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.</description>
      <pubDate>Tue, 25 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/social-media-influencers-cybersecurity-risks.png</image>
      <category>Social Media</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/mdr-answer-now-whats-question/</link>
      <guid>https://www.welivesecurity.com/en/business-security/mdr-answer-now-whats-question/</guid>
      <title>MDR is the answer – now, what’s the question?</title>
      <description>Why your business needs the best-of-breed combination of technology and human expertise</description>
      <pubDate>Mon, 24 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/mdr-thumb.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/osint-playbook-find-weak-spots-attackers-do/</link>
      <guid>https://www.welivesecurity.com/en/privacy/osint-playbook-find-weak-spots-attackers-do/</guid>
      <title>The OSINT advantage: Find your weak spots before attackers do</title>
      <description>Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots</description>
      <pubDate>Thu, 20 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/osint-primer.png</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/</guid>
      <title>PlushDaemon compromises network devices for adversary-in-the-middle attacks</title>
      <description>ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks</description>
      <pubDate>Wed, 19 Nov 2025 09:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/plushdaemon/plushdaemon-aitm-attacks-eset-research.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/romantic-ai-chatbot-keep-secret/</link>
      <guid>https://www.welivesecurity.com/en/privacy/romantic-ai-chatbot-keep-secret/</guid>
      <title>What if your romantic AI chatbot can’t keep a secret?</title>
      <description>Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.</description>
      <pubDate>Mon, 17 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/romantic-ai-chatbots-privacy-security-risks.jpeg</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/password-managers-under-attack-what-you-should-know/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/password-managers-under-attack-what-you-should-know/</guid>
      <title>How password managers can be hacked – and how to stay safe</title>
      <description>Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe</description>
      <pubDate>Thu, 13 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/password-managers-cybersecurity-risks.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/shadow-ai-security-blind-spot/</link>
      <guid>https://www.welivesecurity.com/en/business-security/shadow-ai-security-blind-spot/</guid>
      <title>Why shadow AI could be your biggest security blind spot</title>
      <description>From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company</description>
      <pubDate>Tue, 11 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/shadow-ai-cybersecurity-privacy-risks.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/in-memoriam-david-harley/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/in-memoriam-david-harley/</guid>
      <title>In memoriam: David Harley</title>
      <description>Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security</description>
      <pubDate>Fri, 07 Nov 2025 13:46:10 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/david-harley.jpeg</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/who-where-how-apt-attacks-q2-2025-q3-2025/</link>
      <guid>https://www.welivesecurity.com/en/videos/who-where-how-apt-attacks-q2-2025-q3-2025/</guid>
      <title>The who, where, and how of APT attacks in Q2 2025–Q3 2025</title>
      <description>ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report</description>
      <pubDate>Fri, 07 Nov 2025 12:34:37 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/tony-anscombe-apt-activity-report-q22025-q32025.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2025-q3-2025/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2025-q3-2025/</guid>
      <title>ESET APT Activity Report Q2 2025–Q3 2025</title>
      <description>An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025</description>
      <pubDate>Thu, 06 Nov 2025 09:45:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/eset-apt-activity-report-q2-2025-q3-2025-thumbnail-image.jpeg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/sharing-is-scaring-whatsapp-screen-sharing-scam/</link>
      <guid>https://www.welivesecurity.com/en/scams/sharing-is-scaring-whatsapp-screen-sharing-scam/</guid>
      <title>Sharing is scaring: The WhatsApp scam you didn’t see coming</title>
      <description>How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data</description>
      <pubDate>Wed, 05 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/scams-whatsapp-screen-sharing.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/how-social-engineering-works-unlocked-403-cybersecurity-podcast-s2e6/</link>
      <guid>https://www.welivesecurity.com/en/videos/how-social-engineering-works-unlocked-403-cybersecurity-podcast-s2e6/</guid>
      <title>How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)</title>
      <description>Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead</description>
      <pubDate>Tue, 04 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/cybersecurity-podcast-social-engineering.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/ground-zero-5-things-discovering-cyberattack/</link>
      <guid>https://www.welivesecurity.com/en/business-security/ground-zero-5-things-discovering-cyberattack/</guid>
      <title>Ground zero: 5 things to do after discovering a cyberattack</title>
      <description>When every minute counts, preparation and precision can mean the difference between disruption and disaster</description>
      <pubDate>Mon, 03 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/incident-response-cyberattack.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-october-2025/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-october-2025/</guid>
      <title>This month in security with Tony Anscombe – October 2025 edition</title>
      <description>From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecurity right now</description>
      <pubDate>Fri, 31 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/eset-cybersecurity-recap-october.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/fraud-prevention-how-help-older-family-members-avoid-scams/</link>
      <guid>https://www.welivesecurity.com/en/scams/fraud-prevention-how-help-older-family-members-avoid-scams/</guid>
      <title>Fraud prevention: How to help older family members avoid scams</title>
      <description>Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically</description>
      <pubDate>Thu, 30 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/fraud-prevention-scams-elderly.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-when-seeing-isnt-believing/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-when-seeing-isnt-believing/</guid>
      <title>Cybersecurity Awareness Month 2025: When seeing isn't believing</title>
      <description>Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams</description>
      <pubDate>Wed, 29 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/cybersecurity-awareness-month-deepfakes-videos.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/recruitment-spot-spy-job-seeker/</link>
      <guid>https://www.welivesecurity.com/en/business-security/recruitment-spot-spy-job-seeker/</guid>
      <title>Recruitment red flags: Can you spot a spy posing as a job seeker?</title>
      <description>Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms</description>
      <pubDate>Tue, 28 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/fake-it-workers-hiring.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/mdr-msps-edge-competitive-market/</link>
      <guid>https://www.welivesecurity.com/en/business-security/mdr-msps-edge-competitive-market/</guid>
      <title>How MDR can give MSPs the edge in a competitive market</title>
      <description>With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs</description>
      <pubDate>Mon, 27 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/mdr-msps-security-providers.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-cyber-risk-thrives-shadows/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-cyber-risk-thrives-shadows/</guid>
      <title>Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows</title>
      <description>Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures</description>
      <pubDate>Fri, 24 Oct 2025 11:53:08 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/shadow-it-cybersecurity-video.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/</guid>
      <title>Gotta fly: Lazarus targets the UAV sector</title>
      <description>ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group</description>
      <pubDate>Thu, 23 Oct 2025 04:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/lazarus-targets-uav-sector/lazarus-drones-uav-sector-attacks.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/malware/snakestealer-personal-data-stay-safe/</link>
      <guid>https://www.welivesecurity.com/en/malware/snakestealer-personal-data-stay-safe/</guid>
      <title>SnakeStealer: How it preys on personal data – and how you can protect yourself</title>
      <description>Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts</description>
      <pubDate>Wed, 22 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/snakestealer-infostealer-malware.png</image>
      <category>Malware</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-resilience-ransomware/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-resilience-ransomware/</guid>
      <title>Cybersecurity Awareness Month 2025: Building resilience against ransomware</title>
      <description>Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?</description>
      <pubDate>Mon, 20 Oct 2025 14:11:52 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/cybersecurity-awareness-month-ransomware.jpeg</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/minecraft-mods-minefield-risks/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/minecraft-mods-minefield-risks/</guid>
      <title>Minecraft mods: Should you 'hack' your game?</title>
      <description>Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.</description>
      <pubDate>Thu, 16 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/riesgos-virus-mods-minecraft.jpeg</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/it-service-desks-security-blind-spot-business/</link>
      <guid>https://www.welivesecurity.com/en/business-security/it-service-desks-security-blind-spot-business/</guid>
      <title>IT service desks: The security blind spot that may put your business at risk</title>
      <description>Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.</description>
      <pubDate>Wed, 15 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/it-service-desks-risks-mdr.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-software-patching-matters/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-software-patching-matters/</guid>
      <title>Cybersecurity Awareness Month 2025: Why software patching matters more than ever</title>
      <description>As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.</description>
      <pubDate>Tue, 14 Oct 2025 14:21:37 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/vulnerabilities-software-patching.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/social-media/ai-aided-malvertising-chatbot-scams/</link>
      <guid>https://www.welivesecurity.com/en/social-media/ai-aided-malvertising-chatbot-scams/</guid>
      <title>AI-aided malvertising: Exploiting a chatbot to spread scams</title>
      <description>Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.</description>
      <pubDate>Mon, 13 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/ai-aided-malvertising-grokking.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/how-uber-seems-know-where-you-are-restricted-location-permissions/</link>
      <guid>https://www.welivesecurity.com/en/privacy/how-uber-seems-know-where-you-are-restricted-location-permissions/</guid>
      <title>How Uber seems to know where you are – even with restricted location permissions</title>
      <description>Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.</description>
      <pubDate>Thu, 09 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/uber-location.jpeg</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-passwords-alone-are-not-enough/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-passwords-alone-are-not-enough/</guid>
      <title>Cybersecurity Awareness Month 2025: Passwords alone are not enough</title>
      <description>Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders.</description>
      <pubDate>Wed, 08 Oct 2025 10:08:43 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/cybersecurity-awareness-month-2025-mfa.jpeg</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/case-cybersecurity-successful-businesses-built-protection/</link>
      <guid>https://www.welivesecurity.com/en/business-security/case-cybersecurity-successful-businesses-built-protection/</guid>
      <title>The case for cybersecurity: Why successful businesses are built on protection</title>
      <description>Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center</description>
      <pubDate>Tue, 07 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/business-cybersecurity-importance.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/malware/threats-lurking-pdf-files/</link>
      <guid>https://www.welivesecurity.com/en/malware/threats-lurking-pdf-files/</guid>
      <title>Beware of threats lurking in booby-trapped PDF files</title>
      <description>Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.</description>
      <pubDate>Mon, 06 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/pdf-files-cyber-risks.png</image>
      <category>Malware</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/manufacturing-fire-strengthening-cyber-defenses-surging-threats/</link>
      <guid>https://www.welivesecurity.com/en/business-security/manufacturing-fire-strengthening-cyber-defenses-surging-threats/</guid>
      <title>Manufacturing under fire: Strengthening cyber-defenses amid surging threats</title>
      <description>Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging</description>
      <pubDate>Fri, 03 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/manufacturing-cyber-risks.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/new-spyware-campaigns-target-privacy-conscious-android-users-uae/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/new-spyware-campaigns-target-privacy-conscious-android-users-uae/</guid>
      <title>New spyware campaigns target privacy-conscious Android users in the UAE</title>
      <description>ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates</description>
      <pubDate>Thu, 02 Oct 2025 08:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/android-totok/android-spyware-totok-uae.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-knowledge-power/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-knowledge-power/</guid>
      <title>Cybersecurity Awareness Month 2025: Knowledge is power</title>
      <description>We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals</description>
      <pubDate>Wed, 01 Oct 2025 14:49:17 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/cybersecurity-awareness-month-tony-anscombe-human-element.jpeg</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-september-2025-edition/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-september-2025-edition/</guid>
      <title>This month in security with Tony Anscombe – September 2025 edition</title>
      <description>The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans</description>
      <pubDate>Mon, 29 Sep 2025 10:00:49 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/security-month-tony-anscombe.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/roblox-executors-fun-games-someone-gets-hacked/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/roblox-executors-fun-games-someone-gets-hacked/</guid>
      <title>Roblox executors: It’s all fun and games until someone gets hacked</title>
      <description>You could be getting more than you bargained for when you download that cheat tool promising quick wins</description>
      <pubDate>Fri, 26 Sep 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/roblox-executors.png</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-from-primitive-crypto-theft-to-sophisticated-ai-based-deception/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-from-primitive-crypto-theft-to-sophisticated-ai-based-deception/</guid>
      <title>DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception</title>
      <description>Malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers</description>
      <pubDate>Thu, 25 Sep 2025 08:59:34 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/deceptivedevelopment/deceptivedevelopment-north-korea-it-workers.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/malware/svg-files-spreading-malware/</link>
      <guid>https://www.welivesecurity.com/en/malware/svg-files-spreading-malware/</guid>
      <title>Watch out for SVG files booby-trapped with malware</title>
      <description>What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware</description>
      <pubDate>Mon, 22 Sep 2025 10:24:45 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/08-25/xml-se-convierte-en-dropper/xml-dropper-campana-colombia-home.jpeg</image>
      <category>Malware</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/gamaredon-x-turla-collab/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/gamaredon-x-turla-collab/</guid>
      <title>Gamaredon X Turla collab</title>
      <description>Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine</description>
      <pubDate>Fri, 19 Sep 2025 08:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/gamaredon-x-turla/eset-threat-research-gamaredon-turla-ukraine-collaboration.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/small-businesses-big-targets-protecting-business-ransomware/</link>
      <guid>https://www.welivesecurity.com/en/business-security/small-businesses-big-targets-protecting-business-ransomware/</guid>
      <title>Small businesses, big targets: Protecting your business against ransomware</title>
      <description>Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises</description>
      <pubDate>Thu, 18 Sep 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/small-businesses-cyber-risks-ransomware.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/hybridpetya-petya-notpetya-copycat-twist/</link>
      <guid>https://www.welivesecurity.com/en/videos/hybridpetya-petya-notpetya-copycat-twist/</guid>
      <title>HybridPetya: The Petya/NotPetya copycat comes with a twist</title>
      <description>HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality</description>
      <pubDate>Tue, 16 Sep 2025 11:33:45 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/hybridpetya-tony-anscombe.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/introducing-hybridpetya-petya-notpetya-copycat-uefi-secure-boot-bypass/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/introducing-hybridpetya-petya-notpetya-copycat-uefi-secure-boot-bypass/</guid>
      <title>Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass</title>
      <description>UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal</description>
      <pubDate>Fri, 12 Sep 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/hybridpetya/hybridpetya-petya-notpetya-uefi-secure-boot-bypass.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/cybercriminals-hacking-systems-logging-in/</link>
      <guid>https://www.welivesecurity.com/en/business-security/cybercriminals-hacking-systems-logging-in/</guid>
      <title>Are cybercriminals hacking your systems – or just logging in?</title>
      <description>As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight</description>
      <pubDate>Thu, 11 Sep 2025 08:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/credential-theft-businesses.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/preventing-business-disruption-building-cyber-resilience-mdr/</link>
      <guid>https://www.welivesecurity.com/en/business-security/preventing-business-disruption-building-cyber-resilience-mdr/</guid>
      <title>Preventing business disruption and building cyber-resilience with MDR</title>
      <description>Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy</description>
      <pubDate>Tue, 09 Sep 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/mdr-disruption-downtime.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/under-lock-key-safeguarding-business-data-encryption/</link>
      <guid>https://www.welivesecurity.com/en/business-security/under-lock-key-safeguarding-business-data-encryption/</guid>
      <title>Under lock and key: Safeguarding business data with encryption</title>
      <description>As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose</description>
      <pubDate>Fri, 05 Sep 2025 08:53:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/08-25/encryption-businesses.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/ghostredirector-poisons-windows-servers-backdoors-side-potatoes/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/ghostredirector-poisons-windows-servers-backdoors-side-potatoes/</guid>
      <title>GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes</title>
      <description>ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results</description>
      <pubDate>Thu, 04 Sep 2025 08:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/gr/eset-threat-research-ghostredirector-iis-malware.jpeg</image>
      <category>ESET Research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-august-2025/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-august-2025/</guid>
      <title>This month in security with Tony Anscombe – August 2025 edition</title>
      <description>From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news</description>
      <pubDate>Thu, 28 Aug 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/08-25/month-security-review-august.jpeg</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/dont-let-back-to-school-become-back-to-bullying/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/dont-let-back-to-school-become-back-to-bullying/</guid>
      <title>Don’t let “back to school” become “back to (cyber)bullying”</title>
      <description>Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back</description>
      <pubDate>Wed, 27 Aug 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/08-25/cyberbullying-back-to-school.jpeg</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/ransomware/first-known-ai-powered-ransomware-uncovered-eset-research/</link>
      <guid>https://www.welivesecurity.com/en/ransomware/first-known-ai-powered-ransomware-uncovered-eset-research/</guid>
      <title>First known AI-powered ransomware uncovered by ESET Research</title>
      <description>The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats</description>
      <pubDate>Tue, 26 Aug 2025 23:12:38 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/08-25/ai-powered-ransomware.jpeg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/what-happens-online-stays-online-and-other-cyberbullying-myths-debunked/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/what-happens-online-stays-online-and-other-cyberbullying-myths-debunked/</guid>
      <title>"What happens online stays online" and other cyberbullying myths, debunked</title>
      <description>Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.</description>
      <pubDate>Thu, 21 Aug 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/08-25/cyberbullying-myths-debunked.jpeg</image>
      <category>Kids Online</category>
    </item>
  </channel>
</rss>
