Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

Tony Fadell: Innovating to save our planet | Starmus highlights

As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts

WeLiveSecurity favicon WeLiveSecurity β€’ 12 months ago β€’ 1 min read

CloudScout: Evasive Panda scouting cloud services

ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services

WeLiveSecurity favicon WeLiveSecurity β€’ 12 months ago β€’ 1 min read

ESET Research Podcast: CosmicBeetle

Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world

WeLiveSecurity favicon WeLiveSecurity β€’ 12 months ago β€’ 1 min read

The Global Surveillance Free-for-All in Mobile Ad Data

Not long ago, the ability to remotely track someone’s daily movements just by knowing their home address, employer, or place of worship was considered a powerful surveillance tool that should only be in the purview of nation states. But a new lawsuit in a likely constitutional battle over a New Jersey privacy law shows that anyone can now access this capability, thanks to a proliferation of commercial services that...

Krebs on Security favicon Krebs on Security β€’ 12 months ago β€’ 1 min read

Embargo ransomware: Rock’n’Rust

Novice ransomware group Embargo is testing and deploying a new Rust-based toolkit

WeLiveSecurity favicon WeLiveSecurity β€’ 12 months ago β€’ 1 min read

Google Voice scams: What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Brazil Arrests β€˜USDoD,’ Hacker in FBI Infragard Breach

Brazilian authorities reportedly have arrested a 33-year-old man on suspicion of being "USDoD," a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI's InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind a breach at the consumer data broker National Public Data that led to the leak of Social Security numbers and other personal information for a...

Krebs on Security favicon Krebs on Security β€’ about 1 year ago β€’ 1 min read

Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe

The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Sudanese Brothers Arrested in β€˜AnonSudan’ Takedown

The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan (a.k.a. AnonSudan), a cybercrime business known for launching powerful distributed denial-of-service (DDoS) attacks against a range of targets, including dozens of hospitals, news websites and cloud providers. One of the brothers is facing life in prison for allegedly seeking to kill people...

Krebs on Security favicon Krebs on Security β€’ about 1 year ago β€’ 1 min read

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

β€œHey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships

The world needs more cybersecurity professionals – here are three great ways to give you an β€˜in’ to the ever-growing and rewarding security industry

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

GoldenJackal jumps the air gap … twice – Week in security with Tony Anscombe

ESET research dives deep into a series of attacks that leveraged bespoke toolsets to compromise air-gapped systems belonging to governmental and diplomatic entities

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Telekopye transitions to targeting tourists via hotel booking scam

ESET Research shares new findings about Telekopye, a scam toolkit used to defraud people on online marketplaces, and newly on accommodation booking platforms

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Lamborghini Carjackers Lured by $243M Cyberheist

The parents of a 19-year-old Connecticut honors student accused of taking part in a $243 million cryptocurrency heist in August were carjacked a week later, while out house-hunting in a brand new Lamborghini. Prosecutors say the couple was beaten and briefly kidnapped by six young men who traveled from Florida as part of a botched plan to hold the parents for ransom.

Krebs on Security favicon Krebs on Security β€’ about 1 year ago β€’ 1 min read

Patch Tuesday, October 2024 Edition

Microsoft today released security updates to fix at least 117 security holes in Windows computers and other software, including two vulnerabilities that are already seeing active attacks. Also, Adobe plugged 52 security holes across a range of products, and Apple has addressed a bug in its new macOS 15 "Sequoia" update that broke many cybersecurity tools.

Krebs on Security favicon Krebs on Security β€’ about 1 year ago β€’ 1 min read

Cyber insurance, human risk, and the potential for cyber-ratings

Could human risk in cybersecurity be managed with a cyber-rating, much like credit scores help assess people’s financial responsibility?

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Mind the (air) gap: GoldenJackal gooses government guardrails

ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

The complexities of attack attribution – Week in security with Tony Anscombe

Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Why system resilience should mainly be the job of the OS, not just third-party applications

Building efficient recovery options will drive ecosystem resilience

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Cybersecurity Awareness Month needs a radical overhaul – it needs legislation

Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Gamaredon's operations under the microscope – Week in security with Tony Anscombe

ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023

ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Don’t panic and other tips for staying safe from scareware

Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Time to engage: How parents can help keep their children safe on Snapchat

Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe

With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)

How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Understanding cyber-incident disclosure

Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

ESET Research Podcast: EvilVideo

ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

AI security bubble already springing leaks

Artificial intelligence is just a spoke in the wheel of security – an important spoke but, alas, only one

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

CosmicBeetle joins the ranks of RansomHub affiliates – Week in security with Tony Anscombe

ESET researchers also find that CosmicBeetle attempts to exploit the notoriety of the LockBit ransomware gang to advance its own ends

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

6 common Geek Squad scams and how to defend against them

Learn about the main tactics used by scammers impersonating Best Buy’s tech support arm and how to avoid falling for their tricks

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

CosmicBeetle steps up: Probation period at RansomHub

CosmicBeetle, after improving its own ransomware, tries its luck as a RansomHub affiliate

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read

Bitcoin ATM scams skyrocket – Week in security with Tony Anscombe

The schemes disproportionately victimize senior citizens, as those aged 60 or over were more than three times as likely as younger adults to fall prey to the scams

WeLiveSecurity favicon WeLiveSecurity β€’ about 1 year ago β€’ 1 min read