logo ESET software spol. s r. o.

WeLiveSecurity

WeLiveSecurity je redakční kanál společnosti ESET pro internetové bezpečnostní zprávy, zobrazení a přehledy pokrývající nejnovější průlomové informace spolu s videonávody a podcasty. Cílem je uspokojit všechny úrovně dovedností - od bojem zocelených kodérů až po lidi, kteří hledají rady, jak efektivně zabezpečit svá data.

Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
A sky-high premium may not always reflect your company’s security posture
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product.
ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants
Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.
Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.
Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks
ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024
ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025
ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report
From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news
A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig
Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation
The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies
Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU
ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer.
Have you received a text message about an unpaid road toll? Make sure you’re not the next victim of a smishing scam.
From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions
ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks
From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity
Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements
The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.
What practical AI attacks exist today? “More than zero” is the answer – and they’re getting better.
Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to attempt to steal their data or hijack their devices instead
Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest for your sensitive data
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?
Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.
The computer scientist and AI researcher shares her thoughts on the technology’s potential and pitfalls – and what may lie ahead for us
From an exploited vulnerability in a third-party ChatGPT tool to a bizarre twist on ransomware demands, it's a wrap on another month filled with impactful cybersecurity news
Your company’s ability to tackle the ransomware threat head-on can ultimately be a competitive advantage
Security awareness training doesn’t have to be a snoozefest – games and stories can help instill ‘sticky’ habits that will kick in when a danger is near
ESET researchers also examine the growing threat posed by tools that ransomware affiliates deploy in an attempt to disrupt EDR security solutions
Once thought to be dormant, the China-aligned group has also been observed using the privately-sold ShadowPad backdoor for the first time
ESET researchers discover new ties between affiliates of RansomHub and of rival gangs Medusa, BianLian, and Play
ESET researchers uncover the toolset used by the FamousSparrow APT group, including two undocumented versions of the group’s signature backdoor, SparrowDoor
ESET researchers detail a global espionage operation by FishMonger, the APT group run by I‑SOON
The group's Operation AkaiRyū begins with targeted spearphishing emails that use the upcoming World Expo 2025 in Osaka, Japan, as a lure
ESET researchers uncovered MirrorFace activity that expanded beyond its usual focus on Japan and targeted a Central European diplomatic institute with the ANEL backdoor
Here's what's been hot on the AI scene over the past 12 months, how it's changing the face of warfare, and how you can fight AI-powered scams
While relatively rare, real-world incidents impacting operational technology highlight that organizations in critical infrastructure can’t afford to dismiss the OT threat
Listen up, this is sure to be music to your ears – a few minutes spent securing your account today can save you a ton of trouble tomorrow
Malicious use of AI is reshaping the fraud landscape, creating major new risks for businesses
By taking time to understand and communicate the impact of undesirable online behavior, you can teach your kids an invaluable set of life lessons for a new digital age
Take a moment to think beyond our current capabilities and consider what might come next in the grand story of evolution
Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams on social media
With AI's pattern recognition capabilities well-established, Mr. Schölkopf's talk shifts the focus to a pressing question: what will be the next great leap for AI?
Ransomware payments trending down, the cyber-resilience gap facing SMBs, and APT groups embracing generative AI – it's a wrap on another month filled with impactful security news
The pioneering multi-media artist reveals the creative process behind her stage show called ARK, which challenges audiences to reflect on some of the most pressing issues of our times
A North Korea-aligned activity cluster tracked by ESET as DeceptiveDevelopment drains victims' crypto wallets and steals their login details from web browsers and password managers
ESET researchers analyzed a campaign delivering malware bundled with job interview challenges
Some employment scams take an unexpected turn as cybercriminals shift from “hiring” to “firing” staff
The atmospheric scientist makes a compelling case for a head-to-heart-to-hands connection as a catalyst for climate action
The virtual treasure chests and other casino-like rewards inside your children’s games may pose risks you shouldn’t play down
Ever wondered what it's like to hack for a living – legally? Learn about the art and thrill of ethical hacking and how white-hat hackers help organizations tighten up their security.
Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here's how to fight back
As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms large: what remains uniquely human?
Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching
Left unchecked, AI's energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry without sacrificing performance?
Nabídka zaměstnání ESET software spol. s r. o.