logo ESET software spol. s r. o.

WeLiveSecurity

WeLiveSecurity je redakční kanál společnosti ESET pro internetové bezpečnostní zprávy, zobrazení a přehledy pokrývající nejnovější průlomové informace spolu s videonávody a podcasty. Cílem je uspokojit všechny úrovně dovedností - od bojem zocelených kodérů až po lidi, kteří hledají rady, jak efektivně zabezpečit svá data.

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
12. 12. 2025
Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims
11. 12. 2025
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
11. 12. 2025
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
10. 12. 2025
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
9. 12. 2025
Identity is effectively the new network boundary. It must be protected at all costs.
4. 12. 2025
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook
2. 12. 2025
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
1. 12. 2025
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news
28. 11. 2025
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.
27. 11. 2025
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
25. 11. 2025
Why your business needs the best-of-breed combination of technology and human expertise
24. 11. 2025
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
20. 11. 2025
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
19. 11. 2025
Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.
17. 11. 2025
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
13. 11. 2025
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
11. 11. 2025
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
7. 11. 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
7. 11. 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
6. 11. 2025
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
5. 11. 2025
Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead
4. 11. 2025
When every minute counts, preparation and precision can mean the difference between disruption and disaster
3. 11. 2025
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecurity right now
31. 10. 2025
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically
30. 10. 2025
Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams
29. 10. 2025
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms
28. 10. 2025
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
27. 10. 2025
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures
24. 10. 2025
ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group
23. 10. 2025
Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts
22. 10. 2025
Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
20. 10. 2025
Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
16. 10. 2025
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
15. 10. 2025
As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.
14. 10. 2025
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.
13. 10. 2025
Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.
9. 10. 2025
Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders.
8. 10. 2025
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
7. 10. 2025
Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.
6. 10. 2025
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
3. 10. 2025
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates
2. 10. 2025
We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals
1. 10. 2025
The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans
29. 9. 2025
You could be getting more than you bargained for when you download that cheat tool promising quick wins
26. 9. 2025
Malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers
25. 9. 2025
What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware
22. 9. 2025
Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
19. 9. 2025
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
18. 9. 2025
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
16. 9. 2025
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal
12. 9. 2025
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight
11. 9. 2025
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
9. 9. 2025
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
5. 9. 2025
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
4. 9. 2025
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
28. 8. 2025
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
27. 8. 2025
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
26. 8. 2025
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
21. 8. 2025
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
19. 8. 2025
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
18. 8. 2025
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
12. 8. 2025
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
12. 8. 2025
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
11. 8. 2025
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
11. 8. 2025
A sky-high premium may not always reflect your company’s security posture
8. 8. 2025
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
8. 8. 2025
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
7. 8. 2025
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
7. 8. 2025
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
5. 8. 2025
Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
1. 8. 2025
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
1. 8. 2025
Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
31. 7. 2025
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
29. 7. 2025
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
25. 7. 2025
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities
24. 7. 2025
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
24. 7. 2025
Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product.
22. 7. 2025
ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants
15. 7. 2025
Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.
4. 7. 2025
Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.
4. 7. 2025
Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks
3. 7. 2025
ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024
2. 7. 2025
ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025
1. 7. 2025
ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report
1. 7. 2025
From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news
28. 6. 2025
A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
26. 6. 2025
ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig
5. 6. 2025
Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.
2. 6. 2025
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news
30. 5. 2025
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data
27. 5. 2025
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure
23. 5. 2025
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation
22. 5. 2025
The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies
22. 5. 2025
Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation
21. 5. 2025
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report
19. 5. 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025
19. 5. 2025
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU
15. 5. 2025
ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities
15. 5. 2025
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.
12. 5. 2025