WeLiveSecurity https://www.welivesecurity.com en https://www.welivesecurity.com/en/scams/dear-all-what-are-some-common-subject-lines-in-phishing-emails/ Dear all! What are some common subject lines in phishing emails? Scammers exploit current ongoing events, account notifications, corporate communication, and a sense of urgency. 25 Jul 2023 09:30:00 en https://www.welivesecurity.com/en/videos/what-happens-ai-wrong-week-security-tony-anscombe/ What happens if AI is wrong? – Week in security with Tony Anscombe Responses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user? 21 Jul 2023 12:15:00 en https://www.welivesecurity.com/en/scams/8-common-work-from-home-scams-to-avoid/ 8 common work-from-home scams to avoid That ‘employer’ you’re speaking to may in reality be after your personal information, your money or your help with their illegal activities 20 Jul 2023 09:00:00 en https://www.welivesecurity.com/en/scams/protect-yourself-ticketing-scams-premier-league-summer-series-usa-tour/ Protect yourself from ticketing scams ahead of the Premier League Summer Series USA Tour There is a significant secondary marketplace where tickets can sell for several times their original value, opening the opportunity for scammers and fraud 18 Jul 2023 09:30:00 en https://www.welivesecurity.com/en/kids-online/child-identity-theft-how-keep-kids-personal-data-safe/ Child identity theft: how do I keep my kids’ personal data safe? Why is kids’ personal information in high demand, how do criminals steal it, and what can parents do to help prevent child identity theft? 19 Jul 2023 09:30:00 en https://www.welivesecurity.com/en/videos/key-findings-eset-threat-report-h1-2023-week-security-tony-anscombe/ Key findings from ESET Threat Report H1 2023 – Week in security with Tony Anscombe Here's how cybercriminals have adjusted their tactics in response to Microsoft's stricter security policies, plus other interesting findings from ESET's new Threat Report 14 Jul 2023 13:30:00 en https://www.welivesecurity.com/en/business-security/danger-within-5-steps-combat-insider-threats/ The danger within: 5 steps you can take to combat insider threats Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar? 13 Jul 2023 09:30:00 en https://www.welivesecurity.com/2023/07/12/eset-research-podcast-finding-mythical-blacklotus-bootkit/ ESET Research Podcast: Finding the mythical BlackLotus bootkit Here's a story of how an analysis of a supposed game cheat turned into the discovery of a powerful UEFI threat 12 Jul 2023 11:30:13 en https://www.welivesecurity.com/2023/07/11/eset-threat-report-h1-2023/ ESET Threat Report H1 2023 A view of the H1 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts 11 Jul 2023 11:30:15 en https://www.welivesecurity.com/2023/07/07/emotet-sold-or-on-vacation-week-in-security-with-tony-anscombe/ Emotet: sold or on vacation? – Week in security with Tony Anscombe Originally a banking trojan, Emotet later evolved into a full-blown botnet and went on to become one of the most dangerous cyberthreats worldwide 07 Jul 2023 13:00:40 en https://www.welivesecurity.com/2023/07/06/whats-up-with-emotet/ What’s up with Emotet? A brief summary of what happened with Emotet since its comeback in November 2021 06 Jul 2023 11:30:24 en https://www.welivesecurity.com/2023/07/04/deepfaking-it-deepfake-driven-sextortion-schemes/ Deepfaking it: What to know about deepfake-driven sextortion schemes Criminals increasingly create deepfake nudes from people’s benign public photos in order to extort money from them, the FBI warns 04 Jul 2023 11:30:14 en https://www.welivesecurity.com/2023/07/03/verizon-2023-dbir-whats-new-top-takeaways-smbs/ Verizon 2023 DBIR: What’s new this year and top takeaways for SMBs Here are some of the key insights on the evolving data breach landscape as revealed by Verizon’s analysis of more than 16,000 incidents 03 Jul 2023 11:30:50 en https://www.welivesecurity.com/2023/06/30/good-bad-ugly-ai-week-security-tony-anscombe/ The good, the bad and the ugly of AI – Week in security with Tony Anscombe The growing use of synthetic media and the difficulties in distinguishing between real and fake content raise a slew of legal and ethical questions 30 Jun 2023 15:15:16 en https://www.welivesecurity.com/2023/06/29/employee-monitoring-is-bossware-right-company/ Employee monitoring: Is ‘bossware’ right for your company? While employee monitoring software may boost productivity, it may also be a potential privacy minefield and it can affect your relationship with your employees 29 Jun 2023 11:30:38 en https://www.welivesecurity.com/2023/06/27/schools-out-summer-cyber-guard-down/ School’s out for summer, but it’s not time to let your cyber guard down The beginning of the summer break is the perfect time for parents to remind their children about the importance of safe online habits 27 Jun 2023 11:30:40 en https://www.welivesecurity.com/2023/06/23/what-to-know-about-the-moveit-hack-week-in-security-with-tony-anscombe/ What to know about the MOVEit hack – Week in security with Tony Anscombe The US government has now announced a bounty of $10 million for intel linking the Cl0p ransomware gang to a foreign government 23 Jun 2023 15:30:29 en https://www.welivesecurity.com/2023/06/22/maltego-check-exposed-online/ Maltego: Check how exposed you are online A primer on how to use this powerful tool for uncovering and connecting information from publicly available sources 22 Jun 2023 11:30:27 en https://www.welivesecurity.com/2023/06/21/vacation-stay-step-ahead-travel-scammers/ Going on vacation soon? Stay one step ahead of travel scams From bogus free trips to fake rental homes, here are some of the most common online threats you should look out for both before and during your travels 21 Jun 2023 11:30:27 en https://www.welivesecurity.com/2023/06/20/passwords-out-passkeys-in-ready-make-switch/ Passwords out, passkeys in: are you ready to make the switch? With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching one in favor of the other? 20 Jun 2023 11:30:40 en https://www.welivesecurity.com/2023/06/16/is-a-rat-stealing-your-files-week-in-security-with-tony-anscombe/ Is a RAT stealing your files? – Week in security with Tony Anscombe Could your Android phone be home to a remote access tool (RAT) that steals WhatsApp backups or performs other shenanigans? 16 Jun 2023 17:20:18 en https://www.welivesecurity.com/2023/06/16/cyberbullying-prevention-everyones-responsibility/ Stop Cyberbullying Day: Prevention is everyone's responsibility Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves 16 Jun 2023 11:30:27 en https://www.welivesecurity.com/2023/06/15/android-gravityrat-goes-after-whatsapp-backups/ Android GravityRAT goes after WhatsApp backups ESET researchers analyzed an updated version of Android GravityRAT spyware that steals WhatsApp backup files and can receive commands to delete files 15 Jun 2023 11:30:18 en https://www.welivesecurity.com/2023/06/13/cyber-insurance-101-what-is-it-and-does-my-company-need-it/ Cyber insurance: What is it and does my company need it? While not a 'get out of jail free card' for your business, cyber insurance can help insulate it from the financial impact of a cyber-incident 13 Jun 2023 11:30:03 en https://www.welivesecurity.com/2023/06/09/mixing-cybercrime-cyberespionage-week-security-tony-anscombe/ Mixing cybercrime and cyberespionage – Week in security with Tony Anscombe A crimeware group that usually targets individuals and SMBs in North America and Europe adds cyberespionage to its activities 09 Jun 2023 14:30:02 en https://www.welivesecurity.com/2023/06/08/asylum-ambuscade-crimeware-or-cyberespionage/ Asylum Ambuscade: crimeware or cyberespionage? A curious case of a threat actor at the border between crimeware and cyberespionage 08 Jun 2023 11:30:17 en https://www.welivesecurity.com/2023/06/07/hear-no-evil-ultrasound-attacks-voice-assistants/ Hear no evil: Ultrasound attacks on voice assistants How your voice assistant could do the bidding of a hacker – without you ever hearing a thing 07 Jun 2023 11:30:31 en https://www.welivesecurity.com/2023/06/06/7-tips-spotting-fake-mobile-app/ 7 tips for spotting a fake mobile app Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile security threats in the future 06 Jun 2023 11:30:24 en https://www.welivesecurity.com/2023/06/02/api-security-spotlight-week-security-tony-anscombe/ API security in the spotlight – Week in security with Tony Anscombe Given the reliance of today's digital world on APIs and the fact that attacks targeting them continue to rise sharply, API security cannot be an afterthought. 02 Jun 2023 14:30:21 en https://www.welivesecurity.com/2023/06/01/top-3-api-security-risks-mitigate/ All eyes on APIs: Top 3 API security risks and how to mitigate them As APIs are a favorite target for threat actors, the challenge of securing the glue that holds various software elements together is taking on increasing urgency 01 Jun 2023 11:30:02 en https://www.welivesecurity.com/2023/05/31/5-free-osint-tools-social-media/ 5 free OSINT tools for social media A roundup of some of the handiest tools for the collection and analysis of publicly available data from Twitter, Facebook and other social media platforms 31 May 2023 11:30:25 en https://www.welivesecurity.com/2023/05/30/tricks-trade-cybercrime-ring-fraud-scheme/ Tricks of the trade: How a cybercrime ring operated a multi-level fraud scheme A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys 30 May 2023 11:30:17 en https://www.welivesecurity.com/2023/05/26/app-morphed-trojan-week-security-tony-anscombe/ How an innocuous app morphed into a trojan – Week in security with Tony Anscombe ESET research uncovers an Android app that initially had no harmful features but months later turned into a spying tool 26 May 2023 16:15:09 en https://www.welivesecurity.com/2023/05/25/shedding-light-acecryptor-operation/ Shedding light on AceCryptor and its operation ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware families 25 May 2023 11:30:09 en https://www.welivesecurity.com/2023/05/24/digital-security-self-employed-staying-safe-without-it-team/ Digital security for the self-employed: Staying safe without an IT team to help Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business 24 May 2023 11:30:42 en https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration/ Android app breaking bad: From legitimate screen recording to file exfiltration within a year ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and records audio 23 May 2023 11:30:12 en https://www.welivesecurity.com/2023/05/19/cost-free-lunch-week-security-tony-anscombe/ The real cost of a free lunch – Week in security with Tony Anscombe Don't download software from non-reputable websites and sketchy links – you might be in for more than you bargained for 19 May 2023 14:30:13 en https://www.welivesecurity.com/2023/05/18/5-search-engines-internet-connected-devices-services/ Top 5 search engines for internet-connected devices and services A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet 18 May 2023 11:30:34 en https://www.welivesecurity.com/2023/05/17/meet-ai-new-colleague-work-company-data/ Meet “AI”, your new colleague: could it expose your company's secrets? Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk 17 May 2023 11:30:33 en https://www.welivesecurity.com/2023/05/16/you-may-not-care-where-download-software-malware-does/ You may not care where you download software from, but malware does Why do people still download files from sketchy places and get compromised as a result? 16 May 2023 11:30:00 en https://www.welivesecurity.com/2023/05/12/key-findings-eset-new-apt-activity-report-week-security-tony-anscombe/ Key findings from ESET's new APT Activity Report – Week in security with Tony Anscombe What have some of the world's most infamous advanced threat actors been up to and what might be the implications of their activities for your business? 12 May 2023 17:15:46 en https://www.welivesecurity.com/2023/05/12/why-need-parental-control-software-5-features-look-for/ Why you need parental control software – and 5 features to look for Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize 12 May 2023 11:30:03 en https://www.welivesecurity.com/2023/05/10/stealth-mode-5-simple-strategies-staying-under-radar-online/ Turning on stealth mode: 5 simple strategies for staying under the radar online Have your cake and eat it too – enjoy some of what the online world has to offer without always giving out your contact details 10 May 2023 11:30:54 en https://www.welivesecurity.com/2023/05/09/eset-apt-activity-report-q42022-q12023/ ESET APT Activity Report Q4 2022­–Q1 2023 An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2022 and Q1 2023 09 May 2023 11:30:26 en https://www.welivesecurity.com/2023/05/09/how-war-ukraine-catalyst-private-public-collaborations/ How the war in Ukraine has been a catalyst in private-public collaborations As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital 09 May 2023 10:00:43 en https://www.welivesecurity.com/2023/05/05/apts-msp-access-customer-networks-week-security-tony-anscombe/ APTs target MSP access to customer networks – Week in security with Tony Anscombe The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs exemplifies why state-aligned threat actors should be on the radars of IT service providers 05 May 2023 16:00:25 en https://www.welivesecurity.com/2023/05/04/creating-strong-user-friendly-passwords-tips-business-password-policy/ Creating strong, yet user-friendly passwords: Tips for your business password policy Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization 04 May 2023 11:30:35 en https://www.welivesecurity.com/2023/05/03/using-discord-privacy-security-risks/ Using Discord? Don’t play down its privacy and security risks It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats lurking on the social media juggernaut 03 May 2023 11:30:46 en https://www.welivesecurity.com/2023/05/02/apt-groups-muddying-waters-msps/ APT groups muddying the waters for MSPs A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers 02 May 2023 11:30:46 en https://www.welivesecurity.com/2023/04/28/what-was-hot-rsa-conference-2023-week-security-tony-anscombe/ What was hot at RSA Conference 2023? – Week in security with Tony Anscombe The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT cannot be overstated 28 Apr 2023 16:30:28 en https://www.welivesecurity.com/2023/04/26/rsa-conference-2023-how-ai-infiltrate-world/ RSA Conference 2023 – How AI will infiltrate the world As all things (wrongly called) AI take the world’s biggest security event by storm, we round up of some of their most-touted use cases and applications 26 Apr 2023 16:30:05 en https://www.welivesecurity.com/2023/04/26/evasive-panda-apt-group-malware-updates-popular-chinese-software/ Evasive Panda APT group delivers malware via updates for popular Chinese software ESET Research uncovers a campaign by the APT group known as Evasive Panda targeting an international NGO in China with malware delivered through updates of popular Chinese software 26 Apr 2023 11:30:08 en https://www.welivesecurity.com/2023/04/21/did-you-sell-your-network-access-week-in-security-with-tony-anscombe/ Did you mistakenly sell your network access? – Week in security with Tony Anscombe Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate networks 21 Apr 2023 12:00:25 en https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/ Linux malware strengthens links between Lazarus and the 3CX supply-chain attack Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack 20 Apr 2023 11:30:34 en https://www.welivesecurity.com/2023/04/19/eu-cyber-solidarity-act-security-operations-centers-rescue/ The EU's Cyber Solidarity Act: Security Operations Centers to the rescue! The legislation aims to bolster the Union’s cyber-resilience and enhance its capabilities to prepare for, detect and respond to incidents 19 Apr 2023 15:15:15 en https://www.welivesecurity.com/2023/04/19/pc-running-slow-10-ways-speed-up/ PC running slow? 10 ways you can speed it up Before you rush to buy new hardware, try these simple tricks to get your machine up to speed again – and keep it that way. 19 Apr 2023 11:30:28 en https://www.welivesecurity.com/2023/04/18/discarded-not-destroyed-old-routers-reveal-corporate-secrets/ Discarded, not destroyed: Old routers reveal corporate secrets When decommissioning their old hardware, many companies 'throw the baby out with the bathwater' 18 Apr 2023 15:00:31 en https://www.welivesecurity.com/2023/04/14/compromised-blacklotus-week-security-tony-anscombe/ Hunting down BlackLotus – Week in security with Tony Anscombe Microsoft releases guidance on how organizations can check their systems for the presence of BlackLotus, a powerful threat first analyzed by ESET researchers 14 Apr 2023 13:00:23 en https://www.welivesecurity.com/2023/04/14/safety-first-5-cybersecurity-tips-bloggers/ Safety first: 5 cybersecurity tips for freelance bloggers The much-dreaded writer’s block isn’t the only threat that may derail your progress. Are you doing enough to keep your blog (and your livelihood) safe from online dangers? 14 Apr 2023 11:30:14 en https://www.welivesecurity.com/2023/04/12/what-are-cybersecurity-concerns-smbs-sector/ What are the cybersecurity concerns of SMBs by sector? Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and data secured 12 Apr 2023 11:30:28 en https://www.welivesecurity.com/2023/04/11/10-things-look-buying-password-manager/ 10 things to look out for when buying a password manager Here's how to choose the right password vault for you and what exactly to consider when weighing your options 11 Apr 2023 11:30:14 en https://www.welivesecurity.com/2023/04/06/steer-clear-tax-scams-week-security-tony-anscombe/ Steer clear of tax scams – Week in security with Tony Anscombe In a rush to file your taxes? Watch out for cybercriminals preying on stressed taxpayers as Tax Day looms large on the horizon. 06 Apr 2023 16:15:03 en https://www.welivesecurity.com/2023/04/06/social-media-password-cleanup-trash-treasure/ Cleaning up your social media and passwords: What to trash and what to treasure Give your social media presence a good spring scrubbing, audit your passwords and other easy ways to bring order to your digital chaos 06 Apr 2023 11:30:37 en https://www.welivesecurity.com/2023/04/05/spring-clean-network-backups/ Why you should spring clean your home network and audit your backups Do you know how many devices are connected to your home network? You don’t? This is precisely why it’s time for a network audit. 05 Apr 2023 11:30:09 en https://www.welivesecurity.com/2023/04/04/spring-action-tidy-up-digital-life/ Spring into action and tidy up your digital life like a pro Spring is in the air and as the leaves start growing again, why not breathe some new life into the devices you depend on so badly? 04 Apr 2023 11:30:18 en https://www.welivesecurity.com/2023/03/31/avoiding-data-backup-failures-week-in-security-with-tony-anscombe/ Avoiding data backup failures – Week in security with Tony Anscombe Today is World Backup Day, but maybe we also need a "did you test your backups" day? 31 Mar 2023 15:00:42 en https://www.welivesecurity.com/2023/03/31/world-backup-day-avoiding-data-disaster-forever-topic/ World Backup Day: Avoiding a data disaster is a forever topic By failing to prepare you are preparing to fail. Make sure you're able to bounce back if, or when, a data disaster strikes. 31 Mar 2023 11:30:34 en https://www.welivesecurity.com/2023/03/30/eset-research-podcast-year-fighting-rockets-soldiers-wipers-ukraine/ ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine ESET experts share their insights on the cyber-elements of the first year of the war in Ukraine and how a growing number of destructive malware variants tried to rip through critical Ukrainian systems 30 Mar 2023 11:30:41 en https://www.welivesecurity.com/2023/03/29/pig-butchering-scams-anatomy-fast-growing-threat/ Pig butchering scams: The anatomy of a fast-growing threat How fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers 29 Mar 2023 11:30:03 en https://www.welivesecurity.com/2023/03/28/staying-safe-onlyfans-naked-truth/ Staying safe on OnlyFans: The naked truth How content creators and subscribers can embrace the social media platform without (overly) exposing themselves to the potentially toxic brew of NSFW content and privacy threats 28 Mar 2023 11:30:14 en https://www.welivesecurity.com/2023/03/24/highlights-tiktok-ceo-congress-testimony-week-security-tony-anscombe/ Highlights from TikTok CEO's Congress grilling – Week in security with Tony Anscombe Here are some of the key moments from the five hours of Shou Zi Chew's testimony and other interesting news on the data privacy front 24 Mar 2023 16:50:33 en https://www.welivesecurity.com/2023/03/24/what-tiktok-knows-you-should-know-tiktok/ What TikTok knows about you – and what you should know about TikTok As TikTok CEO attempts to placate U.S. lawmakers, it’s time for us all to think about the wealth of personal information that TikTok and other social media giants collect about us 24 Mar 2023 11:30:53 en https://www.welivesecurity.com/2023/03/23/understanding-managed-detection-response-what-look-mdr-solution/ Understanding Managed Detection and Response – and what to look for in an MDR solution Why your organization should consider an MDR solution and five key things to look for in a service offering 23 Mar 2023 11:30:58 en https://www.welivesecurity.com/2023/03/20/twitter-free-sms-2fa-secure-account/ Twitter ends free SMS 2FA: Here’s how you can protect your account now Twitter’s ditching of free text-message authentication doesn’t mean that you should forgo using 2FA. Instead, switch to another – and, indeed, better – 2FA option. 20 Mar 2023 17:30:33 en https://www.welivesecurity.com/2023/03/17/banking-turmoil-opportunities-cybercriminals-week-security-tony-anscombe/ Banking turmoil opens opportunities for fraud – Week in security with Tony Anscombe Scammers are looking to cash in on the chaos that has set in following the startling meltdowns of Silicon Valley Bank and Signature Bank and the crisis at Credit Suisse 17 Mar 2023 16:30:05 en https://www.welivesecurity.com/2023/03/17/svb-collapse-scammers-dream-dont-get-caught-out/ SVB's collapse is a scammer’s dream: Don’t get caught out How cybercriminals can exploit Silicon Valley Bank's downfall for their own ends – and at your expense 17 Mar 2023 12:12:34 en https://www.welivesecurity.com/2023/03/16/not-so-private-messaging-trojanized-whatsapp-telegram-cryptocurrency-wallets/ Not-so-private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets ESET researchers analyzed Android and Windows clippers that can tamper with instant messages and use OCR to steal cryptocurrency funds 16 Mar 2023 11:30:41 en https://www.welivesecurity.com/2023/03/14/slow-ticking-time-bomb-tick-apt-group-dlp-software-developer-east-asia/ The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia ESET Research uncovered a campaign by APT group Tick against a data-loss prevention company in East Asia and found a previously unreported tool used by the group 14 Mar 2023 11:30:49 en https://www.welivesecurity.com/2023/03/13/signs-scam-how-tell-what-do-next/ 5 signs you’ve fallen for a scam – and what to do next Here’s how to know you have fallen victim to a scam – and what to do in order to undo or mitigate the damage. 13 Mar 2023 11:30:30 en https://www.welivesecurity.com/2023/03/10/apt-hackers-honeytrap-ensnare-targets-week-security-tony-anscombe/ APT hackers set a honeytrap to ensnare victims – Week in security with Tony Anscombe A request to move an online conversation to a supposedly more secure platform may not be as well-meaning as it sounds 10 Mar 2023 15:00:00 en https://www.welivesecurity.com/2023/03/10/common-whatsapp-scams-how-avoid/ Common WhatsApp scams and how to avoid them Here's a roundup of some of the most common tricks that fraudsters use to dupe their victims on WhatsApp – and what you can do to protect yourself against them. 10 Mar 2023 11:30:42 en https://www.welivesecurity.com/2023/03/08/woman-mars-pursuit-of-space-exploration/ 'A woman from Mars': Life in the pursuit of space exploration An astrobiologist, analog astronaut, author and speaker, Dr. Michaela Musilova shares her experience as a woman at the forefront of space exploration and from her quest for scientific and personal excellence 08 Mar 2023 11:30:28 en https://www.welivesecurity.com/2023/03/07/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials/ Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials ESET researchers analyze a cyberespionage campaign that distributes CapraRAT backdoors through trojanized and supposedly secure Android messaging apps – but also exfiltrates sensitive information 07 Mar 2023 11:30:37 en https://www.welivesecurity.com/2023/03/03/what-does-5000-buy-you-on-a-hacking-forum-week-in-security-with-tony-anscombe/ What does $5,000 buy you on a hacking forum? – Week in security with Tony Anscombe A bootkit that ESET researchers have discovered in the wild is the BlackLotus UEFI bootkit that is being peddled on hacking forums 03 Mar 2023 14:00:29 en https://www.welivesecurity.com/2023/03/02/mqsttang-mustang-panda-latest-backdoor-treads-new-ground-qt-mqtt/ MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT ESET researchers tease apart MQsTTang, a new backdoor used by Mustang Panda, which communicates via the MQTT protocol 02 Mar 2023 11:30:48 en https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/ BlackLotus UEFI bootkit: Myth confirmed The first in-the-wild UEFI bootkit bypassing UEFI Secure Boot on fully updated UEFI systems is now a reality 01 Mar 2023 11:30:38 en https://www.welivesecurity.com/2023/02/28/eset-research-podcast-ransomware-trashed-data-android-threats/ ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022 And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in the final four months of 2022. 28 Feb 2023 11:30:04 en https://www.welivesecurity.com/2023/02/24/twelve-months-war-ukraine-cyberspace-week-security-tony-anscombe/ One year on, how is the war playing out in cyberspace? – Week in security with Tony Anscombe With the conflict in Ukraine passing the one-year mark, have its cyber-war elements turned out as expected? 24 Feb 2023 14:00:09 en https://www.welivesecurity.com/2023/02/24/year-wiper-attacks-ukraine/ A year of wiper attacks in Ukraine ESET Research has compiled a timeline of cyberattacks that used wiper malware and have occurred since Russia’s invasion of Ukraine in 2022 24 Feb 2023 11:30:09 en https://www.welivesecurity.com/2023/02/23/winordll64-backdoor-vast-lazarus-arsenal/ WinorDLL64: A backdoor from the vast Lazarus arsenal? The targeted region, and overlap in behavior and code, suggest the tool is used by the infamous North Korea-aligned APT group 23 Feb 2023 11:30:19 en https://www.welivesecurity.com/2023/02/22/chatgpt-level-up-phishing-defenses/ Writing like a boss with ChatGPT and how to get better at spotting phishing scams It’s never been easier to write a convincing message that can trick you into handing over your money or personal data 22 Feb 2023 11:30:16 en https://www.welivesecurity.com/2023/02/21/eset-smb-digital-security-sentiment-report-damaging-effects-breach/ ESET SMB Digital Security Sentiment Report: The damaging effects of a breach SMBs need to not only reduce their odds of being hit by an attack, but also implement processes that they can follow if their defenses are breached 21 Feb 2023 11:30:13 en https://www.welivesecurity.com/2023/02/20/will-chatgpt-start-writing-killer-malware/ Will ChatGPT start writing killer malware? AI-pocalypse soon? As stunning as ChatGPT’s output can be, should we also expect the chatbot to spit out sophisticated malware? 20 Feb 2023 11:30:58 en https://www.welivesecurity.com/2023/02/17/search-ads-abused-spread-malware-week-security-tony-anscombe/ Search ads abused to spread malware – Week in security with Tony Anscombe Threat actors used search engine ads to impersonate makers of popular software and direct internet users to malicious websites 17 Feb 2023 14:00:54 en https://www.welivesecurity.com/2023/02/16/security-amidst-global-frost/ Security amidst a global frost No longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield 16 Feb 2023 17:15:08 en https://www.welivesecurity.com/2023/02/16/these-arent-apps-youre-looking-for-fake-installers/ These aren’t the apps you’re looking for: fake installers targeting Southeast and East Asia ESET researchers have identified a campaign using trojanized installers to deliver the FatalRAT malware, distributed via malicious websites linked in ads that appear in Google search results 16 Feb 2023 11:30:22 en https://www.welivesecurity.com/2023/02/15/10-signs-scammers-sights/ 10 signs that scammers have you in their sights Don’t be their next victim – here’s a handy round-up of some the most common signs that should set your alarm bells ringing 15 Feb 2023 11:30:46 en https://www.welivesecurity.com/2023/02/14/chatgpt-will-you-be-my-valentine/ ChatGPT, will you be my Valentine? Spoiler alert: it turned me down. But that’s far from the only thing I learned while playing around with the bot that the world has fallen in love with so badly. 14 Feb 2023 11:30:06 en https://www.welivesecurity.com/2023/02/13/confident-cybersecurity-fewer-headaches-smbs/ Confident cybersecurity means fewer headaches for SMBs Small and medium-sized businesses have good reason to be concerned about the loss of data and financial impacts 13 Feb 2023 11:30:33 en https://www.welivesecurity.com/2023/02/10/key-findings-from-the-latest-eset-threat-report-week-in-security-with-tony-anscombe/ Key findings from the latest ESET Threat Report – Week in security with Tony Anscombe What is behind the drop in ransomware and what should still be done for containing the ransomware scourge? 10 Feb 2023 16:00:11 en