logo ESET software spol. s r. o.

WeLiveSecurity

WeLiveSecurity je redakční kanál společnosti ESET pro internetové bezpečnostní zprávy, zobrazení a přehledy pokrývající nejnovější průlomové informace spolu s videonávody a podcasty. Cílem je uspokojit všechny úrovně dovedností - od bojem zocelených kodérů až po lidi, kteří hledají rady, jak efektivně zabezpečit svá data.

ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026
13. 3. 2026
The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.
12. 3. 2026
The resurgence of one of Russia’s most notorious APT groups
10. 3. 2026
The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed
6. 3. 2026
We speak to Director of ESET Threat Research Jean-Ian Boutin about where solutions that blend advanced technology with human expertise provide the most practical value for businesses
5. 3. 2026
The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response (MDR) help learning institutions regain the initiative?
4. 3. 2026
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools
28. 2. 2026
Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious privacy and security risks.
27. 2. 2026
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers.
23. 2. 2026
ESET researchers discover PromptSpy, the first known Android malware to abuse generative AI in its execution flow
19. 2. 2026
Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can shop or sell without headaches.
19. 2. 2026
When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.
17. 2. 2026
When corporate data is exposed on a dedicated leak site, the consequences linger long after the attack fades from the news cycle
12. 2. 2026
It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy.
10. 2. 2026
The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams.
4. 2. 2026
It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these best practices.
2. 2. 2026
The trends from January offer useful clues about the risks and priorities that security teams are likely to contend with throughout the year
30. 1. 2026
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector
30. 1. 2026
ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation
28. 1. 2026
Has your inbox recently been deluged with unwanted and even outright malicious messages? Here are 10 possible reasons – and how to stem the tide.
27. 1. 2026
The attack involved data-wiping malware that ESET researchers have now analyzed and named DynoWiper
23. 1. 2026
As children turn to AI chatbots for answers, advice, and companionship, questions emerge about their safety, privacy, and emotional development
23. 1. 2026
Here’s how the most common scams targeting Apple Pay users work and what you can do to stay one step ahead
22. 1. 2026
Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well
20. 1. 2026
The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they say they are.
16. 1. 2026
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
14. 1. 2026
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what to do.
13. 1. 2026
Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts
8. 1. 2026
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year
29. 12. 2025
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to follow.
23. 12. 2025
A comprehensive analysis and assessment of a critical severity vulnerability with low likelihood of mass exploitation
22. 12. 2025
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage tools across networks of governmental institutions
18. 12. 2025
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
16. 12. 2025
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found
12. 12. 2025
Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims
11. 12. 2025
If you don’t look inside your environment, you can’t know its true state – and attackers count on that
11. 12. 2025
Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts and testing authorities can immensely enhance your cyber-resilience.
10. 12. 2025
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.
9. 12. 2025
Identity is effectively the new network boundary. It must be protected at all costs.
4. 12. 2025
MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook
2. 12. 2025
From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities to share work-related information. But posting could also get your company into trouble.
1. 12. 2025
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month's cybersecurity news
28. 11. 2025
Online disagreements among young people can easily spiral out of control. Parents need to understand what’s at stake.
27. 11. 2025
Social media influencers can provide reach and trust for scams and malware distribution. Robust account protection is key to stopping the fraudsters.
25. 11. 2025
Why your business needs the best-of-breed combination of technology and human expertise
24. 11. 2025
Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots
20. 11. 2025
ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks
19. 11. 2025
Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.
17. 11. 2025
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
13. 11. 2025
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
11. 11. 2025
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
7. 11. 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
7. 11. 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
6. 11. 2025
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
5. 11. 2025
Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead
4. 11. 2025
When every minute counts, preparation and precision can mean the difference between disruption and disaster
3. 11. 2025
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecurity right now
31. 10. 2025
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically
30. 10. 2025
Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams
29. 10. 2025
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms
28. 10. 2025
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
27. 10. 2025
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures
24. 10. 2025
ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group
23. 10. 2025
Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts
22. 10. 2025
Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
20. 10. 2025
Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
16. 10. 2025
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
15. 10. 2025
As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.
14. 10. 2025
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.
13. 10. 2025
Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.
9. 10. 2025
Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders.
8. 10. 2025
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
7. 10. 2025
Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.
6. 10. 2025
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
3. 10. 2025
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates
2. 10. 2025
We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals
1. 10. 2025
The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans
29. 9. 2025
You could be getting more than you bargained for when you download that cheat tool promising quick wins
26. 9. 2025
Malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers
25. 9. 2025
What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware
22. 9. 2025
Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
19. 9. 2025
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
18. 9. 2025
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
16. 9. 2025
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal
12. 9. 2025
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight
11. 9. 2025
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
9. 9. 2025
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
5. 9. 2025
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
4. 9. 2025
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
28. 8. 2025
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
27. 8. 2025
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
26. 8. 2025
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
21. 8. 2025
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
19. 8. 2025
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
18. 8. 2025
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
12. 8. 2025
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
12. 8. 2025
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
11. 8. 2025
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
11. 8. 2025
A sky-high premium may not always reflect your company’s security posture
8. 8. 2025
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
8. 8. 2025

Sledujte nás na Facebooku