Latest Articles

Video

The long-tail costs of a data breach – Week in security with Tony Anscombe

The long-tail costs of a data breach – Week in security with Tony Anscombe

Video

The long-tail costs of a data breach – Week in security with Tony Anscombe

Understanding and preparing for the potential long-tail costs of data breaches is crucial for businesses that aim to mitigate the impact of security incidents

Editor21 Jun 2024


Digital Security

My health information has been stolen. Now what?

My health information has been stolen. Now what?

Digital Security

My health information has been stolen. Now what?

As health data continues to be a prized target for hackers, here's how to minimize the fallout from a breach impacting your own health records

Phil Muncaster20 Jun 2024


Business Security, Critical Infrastructure

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is evolving – and that could be bad news for organizations everywhere

Business Security, Critical Infrastructure

Hacktivism is evolving – and that could be bad news for organizations everywhere

Hacktivism is nothing new, but the increasingly fuzzy lines between traditional hacktivism and state-backed operations make it a more potent threat

Phil Muncaster19 Jun 2024


Business Security

Preventative defense tactics in the real world

Preventative defense tactics in the real world

Business Security

Preventative defense tactics in the real world

Don’t get hacked in the first place – it costs far less than dealing with the aftermath of a successful attack

Cameron Camp17 Jun 2024


Video

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

Video

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app

Editor14 Jun 2024


ESET Research

ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024

ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024

ESET Research

ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024

The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023

ESET Research14 Jun 2024


ESET Research

Arid Viper poisons Android apps with AridSpy

Arid Viper poisons Android apps with AridSpy

ESET Research

Arid Viper poisons Android apps with AridSpy

ESET researchers discovered Arid Viper espionage campaigns spreading trojanized apps to Android users in Egypt and Palestine

Lukas Stefanko13 Jun 2024


Digital Security

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

Digital Security

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The results of the 2024 European Cybersecurity Blogger Awards are in and the winner of the Best Cybersecurity Vendor Blog is... drumroll, please... WeLiveSecurity!

Editor10 Jun 2024


Video

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe

Video

560 million Ticketmaster customer data for sale? – Week in security with Tony Anscombe

Ticketmaster seems to have experienced a data breach, with the ShinyHunters hacker group claiming to have exfiltrated 560 million customer data

Editor07 Jun 2024


Scams

The job hunter’s guide: Separating genuine offers from scams

The job hunter’s guide: Separating genuine offers from scams

Scams

The job hunter’s guide: Separating genuine offers from scams

$90,000/year, full home office, and 30 days of paid leave for a junior data analyst – what's not to like? Except that these kinds of job offers are only intended to trick unsuspecting victims into giving up their data.

Márk Szabó06 Jun 2024


How To

The murky world of password leaks – and how to check if you’ve been hit

The murky world of password leaks – and how to check if you’ve been hit

How To

The murky world of password leaks – and how to check if you’ve been hit

Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look

Márk Szabó03 Jun 2024


Video

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

Video

What happens when facial recognition gets it wrong – Week in security with Tony Anscombe

A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability

Editor31 May 2024