WeLiveSecurity - Latest News and Information
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Technology Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
WeLiveSecurity

WeLiveSecurity

Publication
0 followers

Cybersecurity news and research site by ESET offering malware discovery news and analysis of cyber threats.

Recent Posts

Your Personal Information Is on the Dark Web. What Happens Next?
News•Jan 13, 2026

Your Personal Information Is on the Dark Web. What Happens Next?

A surge in data breaches and cyber‑crime tools has flooded the dark web with personal and financial information, with 1,732 incidents reported in the first half of 2025 alone. Threat actors leverage infostealer malware, AI‑generated phishing, and supply‑chain attacks to harvest credentials, session tokens, and biometric data. The article outlines immediate remediation steps—password changes, MFA, credit freezes—and long‑term hygiene practices to protect individuals. It underscores the financial and reputational damage that can follow exposure of PII on underground markets.

By WeLiveSecurity
Credential Stuffing: What It Is and How to Protect Yourself
News•Jan 8, 2026

Credential Stuffing: What It Is and How to Protect Yourself

Credential stuffing exploits reused passwords by feeding leaked username‑password pairs into login forms across services. The technique surged as data breaches and infostealer malware supply vast credential caches, with 62% of Americans admitting frequent reuse. High‑profile incidents—35,000 PayPal accounts in...

By WeLiveSecurity
This Month in Security with Tony Anscombe – December 2025 Edition
News•Dec 29, 2025

This Month in Security with Tony Anscombe – December 2025 Edition

Tony Anscombe, ESET’s chief security evangelist, recaps the year’s most consequential cyber events in his December 2025 roundup. He highlights that U.S. organizations paid more than $2.1 billion in ransomware ransom from 2022‑2024, a figure FinCEN says only scratches the surface. The...

By WeLiveSecurity
A Brush with Online Fraud: What Are Brushing Scams and How Do I Stay Safe?
News•Dec 23, 2025

A Brush with Online Fraud: What Are Brushing Scams and How Do I Stay Safe?

Global e‑commerce sales are set to surpass $6.4 trillion in 2025, fueling intense competition on marketplace review systems. Brushing scams exploit this pressure by sending low‑value items to random addresses, then posting fabricated 5‑star reviews to inflate product rankings. Victims often...

By WeLiveSecurity
LongNosedGoblin Tries to Sniff Out Governmental Affairs in Southeast Asia and Japan
News•Dec 18, 2025

LongNosedGoblin Tries to Sniff Out Governmental Affairs in Southeast Asia and Japan

ESET has identified a previously unknown China‑aligned advanced persistent threat (APT) group, dubbed LongNosedGoblin, targeting governmental entities in Southeast Asia and Japan. The group’s hallmark is the abuse of Windows Group Policy to distribute a suite of custom C#/.NET tools,...

By WeLiveSecurity
ESET Threat Report H2 2025
News•Dec 16, 2025

ESET Threat Report H2 2025

The second half of 2025 saw AI‑driven malware become operational, highlighted by PromptLock, the first known AI‑generated ransomware. Lumma Stealer’s presence faded dramatically, with detections dropping 86% after its May disruption. CloudEyE (GuLoader) exploded in prevalence, increasing thirty‑fold and serving...

By WeLiveSecurity
Black Hat Europe 2025: Was that Device Designed to Be on the Internet at All?
News•Dec 12, 2025

Black Hat Europe 2025: Was that Device Designed to Be on the Internet at All?

At Black Hat Europe 2025, Zero Science Lab highlighted a building‑management system used in over 1,000 global facilities that runs on an 18‑year‑old, publicly‑exposed software platform riddled with vulnerabilities. The talk traced the problem to a series of acquisitions that left security...

By WeLiveSecurity
Black Hat Europe 2025: Reputation Matters – Even in the Ransomware Economy
News•Dec 11, 2025

Black Hat Europe 2025: Reputation Matters – Even in the Ransomware Economy

At Black Hat Europe 2025, Max Smeets dissected LockBit’s ransomware‑as‑a‑service operation, revealing 194 affiliates and 80 successful ransom payments between 2022‑2024. He argued that reputation drives both victim and attacker behavior: companies that pay attract more media scrutiny, while ransomware...

By WeLiveSecurity
Locks, SOCs and a Cat in a Box: What Schrödinger Can Teach Us About Cybersecurity
News•Dec 11, 2025

Locks, SOCs and a Cat in a Box: What Schrödinger Can Teach Us About Cybersecurity

The article likens an organization’s unseen breach risk to Schrödinger’s cat, arguing that without active visibility a firm exists in a dual breached‑or‑not state. Recent high‑profile attacks by Scattered Spider on Marks & Spencer and Jaguar Land Rover illustrate long...

By WeLiveSecurity
Seeking Symmetry During ATT&CK® Season: How to Harness Today’s Diverse Analyst and Tester Landscape to Paint a Security Masterpiece
News•Dec 10, 2025

Seeking Symmetry During ATT&CK® Season: How to Harness Today’s Diverse Analyst and Tester Landscape to Paint a Security Masterpiece

The article maps the sprawling landscape of endpoint‑security analyst reports—from Gartner and Forrester market quadrants to AV‑Comparatives labs and MITRE ATT&CK Evaluations—showing how security leaders can stitch them together into a coherent picture. It likens the process to an artist’s...

By WeLiveSecurity
The Big Catch: How Whaling Attacks Target Top Executives
News•Dec 9, 2025

The Big Catch: How Whaling Attacks Target Top Executives

Whaling attacks—spear‑phishing campaigns aimed at C‑suite leaders—are delivering multi‑million‑dollar losses, exemplified by a $8.7 million fraud that crippled Levitas Capital. Executives’ privileged access, time pressure, and public visibility make them prime targets for business‑email‑compromise schemes. The rise of generative AI now...

By WeLiveSecurity

Page 2 of 2

← Prev12