<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel>
    <title>WeLiveSecurity</title>
    <link>https://www.welivesecurity.com</link>
    <language>en</language>
    <description>WeLiveSecurity</description>
    <item>
      <link>https://www.welivesecurity.com/en/scams/data-breach-alert-might-be-trap/</link>
      <guid>https://www.welivesecurity.com/en/scams/data-breach-alert-might-be-trap/</guid>
      <title>That data breach alert might be a trap</title>
      <description>Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.</description>
      <pubDate>Fri, 17 Apr 2026 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/04-26/fake-data-breach-alert.jpg</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/supply-chain-dependencies-have-you-checked-your-blind-spot/</link>
      <guid>https://www.welivesecurity.com/en/business-security/supply-chain-dependencies-have-you-checked-your-blind-spot/</guid>
      <title>Supply chain dependencies: Have you checked your blind spot?</title>
      <description>Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?</description>
      <pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/04-26/supply-chain-dependencies.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/recovery-scammers-hit-when-down-avoid-second-strike/</link>
      <guid>https://www.welivesecurity.com/en/scams/recovery-scammers-hit-when-down-avoid-second-strike/</guid>
      <title>Recovery scammers hit you when you’re down: Here’s how to avoid a second strike</title>
      <description>If you’ve been a victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse.</description>
      <pubDate>Fri, 10 Apr 2026 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/04-26/recovery-fraud-scams.jpg</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/breakout-time-accelerates-prevention-first-cybersecurity-center-stage/</link>
      <guid>https://www.welivesecurity.com/en/business-security/breakout-time-accelerates-prevention-first-cybersecurity-center-stage/</guid>
      <title>As breakout time accelerates, prevention-first cybersecurity takes center stage</title>
      <description>Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.</description>
      <pubDate>Tue, 07 Apr 2026 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/04-26/breakout-times-cybersecurity.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/digital-assets-death-managing-risks-your-loved-ones-digital-estate/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/digital-assets-death-managing-risks-your-loved-ones-digital-estate/</guid>
      <title>Digital assets after death: Managing risks to your loved one’s digital estate</title>
      <description>Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.</description>
      <pubDate>Wed, 01 Apr 2026 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/digital-estate.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-march-2026/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-march-2026/</guid>
      <title>This month in security with Tony Anscombe – March 2026 edition</title>
      <description>The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan</description>
      <pubDate>Tue, 31 Mar 2026 08:27:18 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/month-security-march.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/rsac-2026-wrap-up-week-security-tony-anscombe/</link>
      <guid>https://www.welivesecurity.com/en/videos/rsac-2026-wrap-up-week-security-tony-anscombe/</guid>
      <title>RSAC 2026 wrap-up – Week in security with Tony Anscombe</title>
      <description>This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with</description>
      <pubDate>Fri, 27 Mar 2026 10:38:21 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/silver-fox/rsac-2026-wrap-up.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/cunning-predator-how-silver-fox-preys-japanese-firms-tax-season/</link>
      <guid>https://www.welivesecurity.com/en/business-security/cunning-predator-how-silver-fox-preys-japanese-firms-tax-season/</guid>
      <title>A cunning predator: How Silver Fox preys on Japanese firms this tax season</title>
      <description>Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening them</description>
      <pubDate>Fri, 27 Mar 2026 07:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/silver-fox/silver-fox-campaign-japan.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/virtual-machines-virtually-everywhere-real-security-gaps/</link>
      <guid>https://www.welivesecurity.com/en/business-security/virtual-machines-virtually-everywhere-real-security-gaps/</guid>
      <title>Virtual machines, virtually everywhere – and with real security gaps</title>
      <description>Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to fend for themselves</description>
      <pubDate>Wed, 25 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/virtual-machines-security.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/cloud-workload-security-mind-gaps/</link>
      <guid>https://www.welivesecurity.com/en/business-security/cloud-workload-security-mind-gaps/</guid>
      <title>Cloud workload security: Mind the gaps</title>
      <description>As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning</description>
      <pubDate>Tue, 24 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/cloud-workloads-1.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/move-fast-save-things-quick-guide-recovering-hacked-account/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/move-fast-save-things-quick-guide-recovering-hacked-account/</guid>
      <title>Move fast and save things: A quick guide to recovering a hacked account</title>
      <description>What you do – and how fast – after an account is compromised often matters more than it may seem</description>
      <pubDate>Fri, 20 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/hacked-accounts-recovery.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/</guid>
      <title>EDR killers explained: Beyond the drivers</title>
      <description>ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers</description>
      <pubDate>Thu, 19 Mar 2026 09:55:08 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/edr-killers/malware-edr-killers-ransomware.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/face-value-what-takes-fool-facial-recognition/</link>
      <guid>https://www.welivesecurity.com/en/privacy/face-value-what-takes-fool-facial-recognition/</guid>
      <title>Face value: What it takes to fool facial recognition</title>
      <description>ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026</description>
      <pubDate>Fri, 13 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/rsac2026-jake-moore.jpg</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/cyber-fallout-iran-war-what-have-radar/</link>
      <guid>https://www.welivesecurity.com/en/business-security/cyber-fallout-iran-war-what-have-radar/</guid>
      <title>Cyber fallout from the Iran war: What to have on your radar</title>
      <description>The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.</description>
      <pubDate>Thu, 12 Mar 2026 14:17:33 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/iran-war-cyber-risks.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/</guid>
      <title>Sednit reloaded: Back in the trenches</title>
      <description>The resurgence of one of Russia’s most notorious APT groups</description>
      <pubDate>Tue, 10 Mar 2026 09:58:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/sednit-reloaded/sednit-apt-group-beardshell-covenant.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/what-cybersecurity-actually-does-for-your-business/</link>
      <guid>https://www.welivesecurity.com/en/business-security/what-cybersecurity-actually-does-for-your-business/</guid>
      <title>What cybersecurity actually does for your business</title>
      <description>The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed</description>
      <pubDate>Fri, 06 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/business-cybersecurity-value.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/how-smbs-use-threat-research-mdr-build-defensive-edge/</link>
      <guid>https://www.welivesecurity.com/en/business-security/how-smbs-use-threat-research-mdr-build-defensive-edge/</guid>
      <title>How SMBs use threat research and MDR to build a defensive edge</title>
      <description>We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses</description>
      <pubDate>Thu, 05 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/03-26/jean-ian-boutin.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/protecting-education-how-mdr-can-tip-balance-favor-schools/</link>
      <guid>https://www.welivesecurity.com/en/business-security/protecting-education-how-mdr-can-tip-balance-favor-schools/</guid>
      <title>Protecting education: How MDR can tip the balance in favor of schools</title>
      <description>The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?</description>
      <pubDate>Wed, 04 Mar 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/mdr-protecting-education.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-february-2026/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-february-2026/</guid>
      <title>This month in security with Tony Anscombe – February 2026 edition</title>
      <description>In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools</description>
      <pubDate>Sat, 28 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/tony-thumb-smaller-copy-1.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/mobile-security/mobile-app-permissions-still-matter-more-think/</link>
      <guid>https://www.welivesecurity.com/en/mobile-security/mobile-app-permissions-still-matter-more-think/</guid>
      <title>Mobile app permissions (still) matter more than you may think</title>
      <description>Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks.</description>
      <pubDate>Fri, 27 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/app-permissions.png</image>
      <category>Mobile Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/faking-it-phone-how-tell-voice-call-ai/</link>
      <guid>https://www.welivesecurity.com/en/business-security/faking-it-phone-how-tell-voice-call-ai/</guid>
      <title>Faking it on the phone: How to tell if a voice call is AI or not</title>
      <description>Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.</description>
      <pubDate>Mon, 23 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/deepfake-calls-voice-cloning.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/</guid>
      <title>PromptSpy ushers in the era of Android threats using GenAI</title>
      <description>ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow</description>
      <pubDate>Thu, 19 Feb 2026 10:30:20 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/promptspy/promptspy-gemini-genai-malware.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/poshmark-safe-buy-sell-scammed/</link>
      <guid>https://www.welivesecurity.com/en/scams/poshmark-safe-buy-sell-scammed/</guid>
      <title>Is Poshmark safe? How to buy and sell without getting scammed</title>
      <description>Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.</description>
      <pubDate>Thu, 19 Feb 2026 07:21:48 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/poshmark.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/children-selfies-online/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/children-selfies-online/</guid>
      <title>Is it OK to let your children post selfies online?</title>
      <description>When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.</description>
      <pubDate>Tue, 17 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/children-selfies.jpg</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/ransomware/naming-shaming-ransomware-groups-tighten-screws-victims/</link>
      <guid>https://www.welivesecurity.com/en/ransomware/naming-shaming-ransomware-groups-tighten-screws-victims/</guid>
      <title>Naming and shaming: How ransomware groups tighten the screws on victims</title>
      <description>When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle</description>
      <pubDate>Thu, 12 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/data-leak-sites-ransomware.png</image>
      <category>Ransomware</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/taxing-times-top-irs-scams-look-out-2026/</link>
      <guid>https://www.welivesecurity.com/en/scams/taxing-times-top-irs-scams-look-out-2026/</guid>
      <title>Taxing times: Top IRS scams to look out for in 2026</title>
      <description>It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.</description>
      <pubDate>Tue, 10 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/tax-scams-irs-fraud.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/offerup-scammers-out-force-heres-what-you-should-know/</link>
      <guid>https://www.welivesecurity.com/en/scams/offerup-scammers-out-force-heres-what-you-should-know/</guid>
      <title>OfferUp scammers are out in force: Here’s what you should know</title>
      <description>The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.</description>
      <pubDate>Wed, 04 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/02-26/offerup-scams-fraud.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/slippery-slope-winter-olympics-scams-cyberthreats/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/slippery-slope-winter-olympics-scams-cyberthreats/</guid>
      <title>A slippery slope: Beware of Winter Olympics scams and other cyberthreats</title>
      <description>It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.</description>
      <pubDate>Mon, 02 Feb 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/winter-olympics-scams-threats.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-january-2026-edition/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-january-2026-edition/</guid>
      <title>This month in security with Tony Anscombe – January 2026 edition</title>
      <description>The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year</description>
      <pubDate>Fri, 30 Jan 2026 15:20:16 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/tony-month-security-news-roundup.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/</guid>
      <title>DynoWiper update: Technical analysis and attribution</title>
      <description>ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector</description>
      <pubDate>Fri, 30 Jan 2026 10:28:38 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/dynowiper/dynowiper-poland-energy-sector-cyberattack.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/love-actually-fake-dating-app-used-lure-targeted-spyware-campaign-pakistan/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/love-actually-fake-dating-app-used-lure-targeted-spyware-campaign-pakistan/</guid>
      <title>Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan</title>
      <description>ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation</description>
      <pubDate>Wed, 28 Jan 2026 09:59:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/love-actually/pakistan-romance-scam.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/drowning-spam-scam-emails-why/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/drowning-spam-scam-emails-why/</guid>
      <title>Drowning in spam or scam emails? Here’s probably why</title>
      <description>Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.</description>
      <pubDate>Tue, 27 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/scam-spam-emails.jpg</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/</guid>
      <title>ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025</title>
      <description>The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper</description>
      <pubDate>Fri, 23 Jan 2026 16:58:26 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/sandworm-poland-attack.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/children-chatbots-what-parents-should-know/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/children-chatbots-what-parents-should-know/</guid>
      <title>Children and chatbots: What parents should know</title>
      <description>As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development</description>
      <pubDate>Fri, 23 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/children-chatbots-privacy-security-risks.jpg</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/common-apple-pay-scams-how-stay-safe/</link>
      <guid>https://www.welivesecurity.com/en/scams/common-apple-pay-scams-how-stay-safe/</guid>
      <title>Common Apple Pay scams, and how to stay safe</title>
      <description>Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead</description>
      <pubDate>Thu, 22 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/apple-pay-scams.jpg</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/old-habits-die-hard-2025-most-common-passwords/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/old-habits-die-hard-2025-most-common-passwords/</guid>
      <title>Old habits die hard: 2025’s most common passwords were as predictable as ever</title>
      <description>Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well</description>
      <pubDate>Tue, 20 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/passwords-2025/contrasena-mas-usadas-2025.jpg</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/social-media/linkedin-hunting-ground-threat-actors-how-protect-yourself/</link>
      <guid>https://www.welivesecurity.com/en/social-media/linkedin-hunting-ground-threat-actors-how-protect-yourself/</guid>
      <title>Why LinkedIn is a hunting ground for threat actors – and how to protect yourself</title>
      <description>The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.</description>
      <pubDate>Fri, 16 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/linkedin-cyberattacks-social-engineering.png</image>
      <category>Social Media</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/social-media/time-internet-services-adopt-identity-verification/</link>
      <guid>https://www.welivesecurity.com/en/social-media/time-internet-services-adopt-identity-verification/</guid>
      <title>Is it time for internet services to adopt identity verification?</title>
      <description>Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.</description>
      <pubDate>Wed, 14 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/internet-verification.png</image>
      <category>Social Media</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/information-dark-web-what-happens-next/</link>
      <guid>https://www.welivesecurity.com/en/privacy/information-dark-web-what-happens-next/</guid>
      <title>Your personal information is on the dark web. What happens next?</title>
      <description>If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.</description>
      <pubDate>Tue, 13 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/dark-web-personal-information-data.jpg</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/credential-stuffing-what-it-is-how-protect-yourself/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/credential-stuffing-what-it-is-how-protect-yourself/</guid>
      <title>Credential stuffing: What it is and how to protect yourself</title>
      <description>Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts</description>
      <pubDate>Thu, 08 Jan 2026 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2026/01-26/password-habits.jpg</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-december-2025/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-december-2025/</guid>
      <title>This month in security with Tony Anscombe – December 2025 edition</title>
      <description>As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year</description>
      <pubDate>Mon, 29 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/tony-anscombe-monthly-video-december.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/brush-online-fraud-what-are-brushing-scams-how-do-i-stay-safe/</link>
      <guid>https://www.welivesecurity.com/en/scams/brush-online-fraud-what-are-brushing-scams-how-do-i-stay-safe/</guid>
      <title>A brush with online fraud: What are brushing scams and how do I stay safe?</title>
      <description>Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.</description>
      <pubDate>Tue, 23 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/brushing-scam.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/</guid>
      <title>Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component</title>
      <description>A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation</description>
      <pubDate>Mon, 22 Dec 2025 09:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/cve-2025-50165/cve-2025-50165-windows-imaging-component-vulnerability.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/longnosedgoblin-tries-sniff-out-governmental-affairs-southeast-asia-japan/</guid>
      <title>LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan</title>
      <description>ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions</description>
      <pubDate>Thu, 18 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/longnosedgoblin/eset-threat-research-longnosed-goblin-southeast-asia-japan.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2025/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2025/</guid>
      <title>ESET Threat Report H2 2025</title>
      <description>A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts</description>
      <pubDate>Tue, 16 Dec 2025 09:50:45 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/eset-threat-report-h2-2025.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/internet-of-things/black-hat-europe-2025-device-designed-internet/</link>
      <guid>https://www.welivesecurity.com/en/internet-of-things/black-hat-europe-2025-device-designed-internet/</guid>
      <title>Black Hat Europe 2025: Was that device designed to be on the internet at all?</title>
      <description>Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found</description>
      <pubDate>Fri, 12 Dec 2025 15:22:52 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/black-hat-europe-buildings-ics-siegeware.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/black-hat-europe-2025-reputation-ransomware/</link>
      <guid>https://www.welivesecurity.com/en/business-security/black-hat-europe-2025-reputation-ransomware/</guid>
      <title>Black Hat Europe 2025: Reputation matters – even in the ransomware economy</title>
      <description>Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims</description>
      <pubDate>Thu, 11 Dec 2025 16:04:19 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/ransomware-raas-reputation.jpg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/locks-socs-cat-box-what-schrodinger-can-teach-us-about-cybersecurity/</link>
      <guid>https://www.welivesecurity.com/en/business-security/locks-socs-cat-box-what-schrodinger-can-teach-us-about-cybersecurity/</guid>
      <title>Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity</title>
      <description>If you don’t look inside your environment, you can’t know its true state – and attackers count on that</description>
      <pubDate>Thu, 11 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/cat-schrodinger.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/seeking-symmetry-attck-season-harness-todays-diverse-analyst-tester-landscape-paint-security-masterpiece/</link>
      <guid>https://www.welivesecurity.com/en/business-security/seeking-symmetry-attck-season-harness-todays-diverse-analyst-tester-landscape-paint-security-masterpiece/</guid>
      <title>Seeking symmetry during ATT&amp;CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece</title>
      <description>Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.</description>
      <pubDate>Wed, 10 Dec 2025 15:03:51 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/mitre-attack-evaluation.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/big-catch-how-whaling-attacks-target-top-executives/</link>
      <guid>https://www.welivesecurity.com/en/business-security/big-catch-how-whaling-attacks-target-top-executives/</guid>
      <title>The big catch: How whaling attacks target top executives</title>
      <description>Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.</description>
      <pubDate>Tue, 09 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/executives.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/phishing-privileges-passwords-identity-cybersecurity-posture/</link>
      <guid>https://www.welivesecurity.com/en/business-security/phishing-privileges-passwords-identity-cybersecurity-posture/</guid>
      <title>Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture</title>
      <description>Identity is effectively the new network boundary. It must be protected at all costs.</description>
      <pubDate>Thu, 04 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/12-25/phishing-privileges-and-passwords.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/</guid>
      <title>MuddyWater: Snakes by the riverbank</title>
      <description>MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook</description>
      <pubDate>Tue, 02 Dec 2025 10:00:15 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/muddywater/muddywater-eset-threat-research.jpg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/oversharing-is-not-caring-stake-employees-post-too-much-online/</link>
      <guid>https://www.welivesecurity.com/en/business-security/oversharing-is-not-caring-stake-employees-post-too-much-online/</guid>
      <title>Oversharing is not caring: What’s at stake if your employees post too much online</title>
      <description>From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.</description>
      <pubDate>Mon, 01 Dec 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/oversharing-social-media-employees.jpg</image>
      <category>Social Media</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-november-2025/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-november-2025/</guid>
      <title>This month in security with Tony Anscombe – November 2025 edition</title>
      <description>Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news</description>
      <pubDate>Fri, 28 Nov 2025 13:46:36 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/cybersecurity-news-tony-anscombe-thumbnail.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/parents-protect-children-doxxing/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/parents-protect-children-doxxing/</guid>
      <title>What parents should know to protect their children from doxxing</title>
      <description>Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.</description>
      <pubDate>Thu, 27 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/doxxing-children.jpg</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/social-media/influencers-crosshairs-cybercriminals-targeting-content-creators/</link>
      <guid>https://www.welivesecurity.com/en/social-media/influencers-crosshairs-cybercriminals-targeting-content-creators/</guid>
      <title>Influencers in the crosshairs: How cybercriminals are targeting content creators</title>
      <description>Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.</description>
      <pubDate>Tue, 25 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/social-media-influencers-cybersecurity-risks.png</image>
      <category>Social Media</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/mdr-answer-now-whats-question/</link>
      <guid>https://www.welivesecurity.com/en/business-security/mdr-answer-now-whats-question/</guid>
      <title>MDR is the answer – now, what’s the question?</title>
      <description>Why your business needs the best-of-breed combination of technology and human expertise</description>
      <pubDate>Mon, 24 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/mdr-thumb.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/osint-playbook-find-weak-spots-attackers-do/</link>
      <guid>https://www.welivesecurity.com/en/privacy/osint-playbook-find-weak-spots-attackers-do/</guid>
      <title>The OSINT advantage: Find your weak spots before attackers do</title>
      <description>Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots</description>
      <pubDate>Thu, 20 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/osint-primer.png</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/</guid>
      <title>PlushDaemon compromises network devices for adversary-in-the-middle attacks</title>
      <description>ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks</description>
      <pubDate>Wed, 19 Nov 2025 09:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/plushdaemon/plushdaemon-aitm-attacks-eset-research.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/romantic-ai-chatbot-keep-secret/</link>
      <guid>https://www.welivesecurity.com/en/privacy/romantic-ai-chatbot-keep-secret/</guid>
      <title>What if your romantic AI chatbot can’t keep a secret?</title>
      <description>Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.</description>
      <pubDate>Mon, 17 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/romantic-ai-chatbots-privacy-security-risks.jpeg</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/password-managers-under-attack-what-you-should-know/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/password-managers-under-attack-what-you-should-know/</guid>
      <title>How password managers can be hacked – and how to stay safe</title>
      <description>Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe</description>
      <pubDate>Thu, 13 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/password-managers-cybersecurity-risks.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/shadow-ai-security-blind-spot/</link>
      <guid>https://www.welivesecurity.com/en/business-security/shadow-ai-security-blind-spot/</guid>
      <title>Why shadow AI could be your biggest security blind spot</title>
      <description>From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company</description>
      <pubDate>Tue, 11 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/shadow-ai-cybersecurity-privacy-risks.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/cybersecurity/in-memoriam-david-harley/</link>
      <guid>https://www.welivesecurity.com/en/cybersecurity/in-memoriam-david-harley/</guid>
      <title>In memoriam: David Harley</title>
      <description>Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security</description>
      <pubDate>Fri, 07 Nov 2025 13:46:10 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/david-harley.jpeg</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/who-where-how-apt-attacks-q2-2025-q3-2025/</link>
      <guid>https://www.welivesecurity.com/en/videos/who-where-how-apt-attacks-q2-2025-q3-2025/</guid>
      <title>The who, where, and how of APT attacks in Q2 2025–Q3 2025</title>
      <description>ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report</description>
      <pubDate>Fri, 07 Nov 2025 12:34:37 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/tony-anscombe-apt-activity-report-q22025-q32025.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2025-q3-2025/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2025-q3-2025/</guid>
      <title>ESET APT Activity Report Q2 2025–Q3 2025</title>
      <description>An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025</description>
      <pubDate>Thu, 06 Nov 2025 09:45:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/eset-apt-activity-report-q2-2025-q3-2025-thumbnail-image.jpeg</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/sharing-is-scaring-whatsapp-screen-sharing-scam/</link>
      <guid>https://www.welivesecurity.com/en/scams/sharing-is-scaring-whatsapp-screen-sharing-scam/</guid>
      <title>Sharing is scaring: The WhatsApp scam you didn’t see coming</title>
      <description>How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data</description>
      <pubDate>Wed, 05 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/scams-whatsapp-screen-sharing.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/how-social-engineering-works-unlocked-403-cybersecurity-podcast-s2e6/</link>
      <guid>https://www.welivesecurity.com/en/videos/how-social-engineering-works-unlocked-403-cybersecurity-podcast-s2e6/</guid>
      <title>How social engineering works | Unlocked 403 cybersecurity podcast (S2E6)</title>
      <description>Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead</description>
      <pubDate>Tue, 04 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/11-25/cybersecurity-podcast-social-engineering.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/ground-zero-5-things-discovering-cyberattack/</link>
      <guid>https://www.welivesecurity.com/en/business-security/ground-zero-5-things-discovering-cyberattack/</guid>
      <title>Ground zero: 5 things to do after discovering a cyberattack</title>
      <description>When every minute counts, preparation and precision can mean the difference between disruption and disaster</description>
      <pubDate>Mon, 03 Nov 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/incident-response-cyberattack.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-october-2025/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-october-2025/</guid>
      <title>This month in security with Tony Anscombe – October 2025 edition</title>
      <description>From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecurity right now</description>
      <pubDate>Fri, 31 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/eset-cybersecurity-recap-october.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/scams/fraud-prevention-how-help-older-family-members-avoid-scams/</link>
      <guid>https://www.welivesecurity.com/en/scams/fraud-prevention-how-help-older-family-members-avoid-scams/</guid>
      <title>Fraud prevention: How to help older family members avoid scams</title>
      <description>Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically</description>
      <pubDate>Thu, 30 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/fraud-prevention-scams-elderly.png</image>
      <category>Scams</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-when-seeing-isnt-believing/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-when-seeing-isnt-believing/</guid>
      <title>Cybersecurity Awareness Month 2025: When seeing isn't believing</title>
      <description>Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams</description>
      <pubDate>Wed, 29 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/cybersecurity-awareness-month-deepfakes-videos.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/recruitment-spot-spy-job-seeker/</link>
      <guid>https://www.welivesecurity.com/en/business-security/recruitment-spot-spy-job-seeker/</guid>
      <title>Recruitment red flags: Can you spot a spy posing as a job seeker?</title>
      <description>Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms</description>
      <pubDate>Tue, 28 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/fake-it-workers-hiring.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/mdr-msps-edge-competitive-market/</link>
      <guid>https://www.welivesecurity.com/en/business-security/mdr-msps-edge-competitive-market/</guid>
      <title>How MDR can give MSPs the edge in a competitive market</title>
      <description>With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs</description>
      <pubDate>Mon, 27 Oct 2025 10:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/mdr-msps-security-providers.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-cyber-risk-thrives-shadows/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-cyber-risk-thrives-shadows/</guid>
      <title>Cybersecurity Awareness Month 2025: Cyber-risk thrives in the shadows</title>
      <description>Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures</description>
      <pubDate>Fri, 24 Oct 2025 11:53:08 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/shadow-it-cybersecurity-video.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/gotta-fly-lazarus-targets-uav-sector/</guid>
      <title>Gotta fly: Lazarus targets the UAV sector</title>
      <description>ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group</description>
      <pubDate>Thu, 23 Oct 2025 04:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/lazarus-targets-uav-sector/lazarus-drones-uav-sector-attacks.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/malware/snakestealer-personal-data-stay-safe/</link>
      <guid>https://www.welivesecurity.com/en/malware/snakestealer-personal-data-stay-safe/</guid>
      <title>SnakeStealer: How it preys on personal data – and how you can protect yourself</title>
      <description>Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts</description>
      <pubDate>Wed, 22 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/snakestealer-infostealer-malware.png</image>
      <category>Malware</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-resilience-ransomware/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-resilience-ransomware/</guid>
      <title>Cybersecurity Awareness Month 2025: Building resilience against ransomware</title>
      <description>Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?</description>
      <pubDate>Mon, 20 Oct 2025 14:11:52 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/cybersecurity-awareness-month-ransomware.jpeg</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/minecraft-mods-minefield-risks/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/minecraft-mods-minefield-risks/</guid>
      <title>Minecraft mods: Should you 'hack' your game?</title>
      <description>Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.</description>
      <pubDate>Thu, 16 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/riesgos-virus-mods-minecraft.jpeg</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/it-service-desks-security-blind-spot-business/</link>
      <guid>https://www.welivesecurity.com/en/business-security/it-service-desks-security-blind-spot-business/</guid>
      <title>IT service desks: The security blind spot that may put your business at risk</title>
      <description>Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.</description>
      <pubDate>Wed, 15 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/it-service-desks-risks-mdr.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-software-patching-matters/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-software-patching-matters/</guid>
      <title>Cybersecurity Awareness Month 2025: Why software patching matters more than ever</title>
      <description>As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.</description>
      <pubDate>Tue, 14 Oct 2025 14:21:37 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/vulnerabilities-software-patching.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/social-media/ai-aided-malvertising-chatbot-scams/</link>
      <guid>https://www.welivesecurity.com/en/social-media/ai-aided-malvertising-chatbot-scams/</guid>
      <title>AI-aided malvertising: Exploiting a chatbot to spread scams</title>
      <description>Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.</description>
      <pubDate>Mon, 13 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/ai-aided-malvertising-grokking.png</image>
      <category>Digital Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/privacy/how-uber-seems-know-where-you-are-restricted-location-permissions/</link>
      <guid>https://www.welivesecurity.com/en/privacy/how-uber-seems-know-where-you-are-restricted-location-permissions/</guid>
      <title>How Uber seems to know where you are – even with restricted location permissions</title>
      <description>Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.</description>
      <pubDate>Thu, 09 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/uber-location.jpeg</image>
      <category>Privacy</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-passwords-alone-are-not-enough/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-passwords-alone-are-not-enough/</guid>
      <title>Cybersecurity Awareness Month 2025: Passwords alone are not enough</title>
      <description>Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders.</description>
      <pubDate>Wed, 08 Oct 2025 10:08:43 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/cybersecurity-awareness-month-2025-mfa.jpeg</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/case-cybersecurity-successful-businesses-built-protection/</link>
      <guid>https://www.welivesecurity.com/en/business-security/case-cybersecurity-successful-businesses-built-protection/</guid>
      <title>The case for cybersecurity: Why successful businesses are built on protection</title>
      <description>Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center</description>
      <pubDate>Tue, 07 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/business-cybersecurity-importance.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/malware/threats-lurking-pdf-files/</link>
      <guid>https://www.welivesecurity.com/en/malware/threats-lurking-pdf-files/</guid>
      <title>Beware of threats lurking in booby-trapped PDF files</title>
      <description>Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.</description>
      <pubDate>Mon, 06 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/pdf-files-cyber-risks.png</image>
      <category>Malware</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/manufacturing-fire-strengthening-cyber-defenses-surging-threats/</link>
      <guid>https://www.welivesecurity.com/en/business-security/manufacturing-fire-strengthening-cyber-defenses-surging-threats/</guid>
      <title>Manufacturing under fire: Strengthening cyber-defenses amid surging threats</title>
      <description>Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging</description>
      <pubDate>Fri, 03 Oct 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/manufacturing-cyber-risks.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/new-spyware-campaigns-target-privacy-conscious-android-users-uae/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/new-spyware-campaigns-target-privacy-conscious-android-users-uae/</guid>
      <title>New spyware campaigns target privacy-conscious Android users in the UAE</title>
      <description>ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates</description>
      <pubDate>Thu, 02 Oct 2025 08:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/android-totok/android-spyware-totok-uae.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-knowledge-power/</link>
      <guid>https://www.welivesecurity.com/en/videos/cybersecurity-awareness-month-2025-knowledge-power/</guid>
      <title>Cybersecurity Awareness Month 2025: Knowledge is power</title>
      <description>We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals</description>
      <pubDate>Wed, 01 Oct 2025 14:49:17 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/10-25/cybersecurity-awareness-month-tony-anscombe-human-element.jpeg</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-september-2025-edition/</link>
      <guid>https://www.welivesecurity.com/en/videos/month-security-tony-anscombe-september-2025-edition/</guid>
      <title>This month in security with Tony Anscombe – September 2025 edition</title>
      <description>The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans</description>
      <pubDate>Mon, 29 Sep 2025 10:00:49 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/security-month-tony-anscombe.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/kids-online/roblox-executors-fun-games-someone-gets-hacked/</link>
      <guid>https://www.welivesecurity.com/en/kids-online/roblox-executors-fun-games-someone-gets-hacked/</guid>
      <title>Roblox executors: It’s all fun and games until someone gets hacked</title>
      <description>You could be getting more than you bargained for when you download that cheat tool promising quick wins</description>
      <pubDate>Fri, 26 Sep 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/roblox-executors.png</image>
      <category>Kids Online</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-from-primitive-crypto-theft-to-sophisticated-ai-based-deception/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-from-primitive-crypto-theft-to-sophisticated-ai-based-deception/</guid>
      <title>DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception</title>
      <description>Malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers</description>
      <pubDate>Thu, 25 Sep 2025 08:59:34 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/deceptivedevelopment/deceptivedevelopment-north-korea-it-workers.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/malware/svg-files-spreading-malware/</link>
      <guid>https://www.welivesecurity.com/en/malware/svg-files-spreading-malware/</guid>
      <title>Watch out for SVG files booby-trapped with malware</title>
      <description>What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware</description>
      <pubDate>Mon, 22 Sep 2025 10:24:45 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/08-25/xml-se-convierte-en-dropper/xml-dropper-campana-colombia-home.jpeg</image>
      <category>Malware</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/gamaredon-x-turla-collab/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/gamaredon-x-turla-collab/</guid>
      <title>Gamaredon X Turla collab</title>
      <description>Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine</description>
      <pubDate>Fri, 19 Sep 2025 08:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/gamaredon-x-turla/eset-threat-research-gamaredon-turla-ukraine-collaboration.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/small-businesses-big-targets-protecting-business-ransomware/</link>
      <guid>https://www.welivesecurity.com/en/business-security/small-businesses-big-targets-protecting-business-ransomware/</guid>
      <title>Small businesses, big targets: Protecting your business against ransomware</title>
      <description>Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises</description>
      <pubDate>Thu, 18 Sep 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/small-businesses-cyber-risks-ransomware.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/videos/hybridpetya-petya-notpetya-copycat-twist/</link>
      <guid>https://www.welivesecurity.com/en/videos/hybridpetya-petya-notpetya-copycat-twist/</guid>
      <title>HybridPetya: The Petya/NotPetya copycat comes with a twist</title>
      <description>HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality</description>
      <pubDate>Tue, 16 Sep 2025 11:33:45 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/hybridpetya-tony-anscombe.png</image>
      <category>Video</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/introducing-hybridpetya-petya-notpetya-copycat-uefi-secure-boot-bypass/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/introducing-hybridpetya-petya-notpetya-copycat-uefi-secure-boot-bypass/</guid>
      <title>Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass</title>
      <description>UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal</description>
      <pubDate>Fri, 12 Sep 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/hybridpetya/hybridpetya-petya-notpetya-uefi-secure-boot-bypass.png</image>
      <category>ESET research</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/cybercriminals-hacking-systems-logging-in/</link>
      <guid>https://www.welivesecurity.com/en/business-security/cybercriminals-hacking-systems-logging-in/</guid>
      <title>Are cybercriminals hacking your systems – or just logging in?</title>
      <description>As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight</description>
      <pubDate>Thu, 11 Sep 2025 08:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/credential-theft-businesses.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/preventing-business-disruption-building-cyber-resilience-mdr/</link>
      <guid>https://www.welivesecurity.com/en/business-security/preventing-business-disruption-building-cyber-resilience-mdr/</guid>
      <title>Preventing business disruption and building cyber-resilience with MDR</title>
      <description>Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy</description>
      <pubDate>Tue, 09 Sep 2025 09:00:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/mdr-disruption-downtime.png</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/business-security/under-lock-key-safeguarding-business-data-encryption/</link>
      <guid>https://www.welivesecurity.com/en/business-security/under-lock-key-safeguarding-business-data-encryption/</guid>
      <title>Under lock and key: Safeguarding business data with encryption</title>
      <description>As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose</description>
      <pubDate>Fri, 05 Sep 2025 08:53:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/08-25/encryption-businesses.jpeg</image>
      <category>Business Security</category>
    </item>
    <item>
      <link>https://www.welivesecurity.com/en/eset-research/ghostredirector-poisons-windows-servers-backdoors-side-potatoes/</link>
      <guid>https://www.welivesecurity.com/en/eset-research/ghostredirector-poisons-windows-servers-backdoors-side-potatoes/</guid>
      <title>GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes</title>
      <description>ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results</description>
      <pubDate>Thu, 04 Sep 2025 08:55:00 +0000</pubDate>
      <image>https://web-assets.esetstatic.com/wls/2025/09-25/gr/eset-threat-research-ghostredirector-iis-malware.jpeg</image>
      <category>ESET Research</category>
    </item>
  </channel>
</rss>
