logo ESET software spol. s r. o.

WeLiveSecurity

WeLiveSecurity je redakční kanál společnosti ESET pro internetové bezpečnostní zprávy, zobrazení a přehledy pokrývající nejnovější průlomové informace spolu s videonávody a podcasty. Cílem je uspokojit všechny úrovně dovedností - od bojem zocelených kodérů až po lidi, kteří hledají rady, jak efektivně zabezpečit svá data.

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
Fri, 07 Nov 2025
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
Fri, 07 Nov 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
Thu, 06 Nov 2025
How a fast-growing scam is tricking WhatsApp users into revealing their most sensitive financial and other data
Wed, 05 Nov 2025
Think you could never fall for an online scam? Think again. Here's how scammers could exploit psychology to deceive you – and what you can do to stay one step ahead
Tue, 04 Nov 2025
When every minute counts, preparation and precision can mean the difference between disruption and disaster
Mon, 03 Nov 2025
From the end of Windows 10 support to scams on TikTok and state-aligned hackers wielding AI, October's headlines offer a glimpse of what's shaping cybersecurity right now
Fri, 31 Oct 2025
Families that combine open communication with effective behavioral and technical safeguards can cut the risk dramatically
Thu, 30 Oct 2025
Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams
Wed, 29 Oct 2025
Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms
Tue, 28 Oct 2025
With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs
Mon, 27 Oct 2025
Shadow IT leaves organizations exposed to cyberattacks and raises the risk of data loss and compliance failures
Fri, 24 Oct 2025
ESET research analyzes a recent instance of the Operation DreamJob cyberespionage campaign conducted by Lazarus, a North Korea-aligned APT group
Thu, 23 Oct 2025
Here’s what to know about the malware with an insatiable appetite for valuable data, so much so that it tops this year's infostealer detection charts
Wed, 22 Oct 2025
Ransomware rages on and no organization is too small to be targeted by cyber-extortionists. How can your business protect itself against the threat?
Mon, 20 Oct 2025
Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.
Thu, 16 Oct 2025
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
Wed, 15 Oct 2025
As the number of software vulnerabilities continues to increase, delaying or skipping security updates could cost your business dearly.
Tue, 14 Oct 2025
Cybercriminals have tricked X’s AI chatbot into promoting phishing scams in a technique that has been nicknamed “Grokking”. Here’s what to know about it.
Mon, 13 Oct 2025
Is the ride-hailing app secretly tracking you? Not really, but this iOS feature may make it feel that way.
Thu, 09 Oct 2025
Never rely on just a password, however strong it may be. Multi-factor authentication is essential for anyone who wants to protect their online accounts from intruders.
Wed, 08 Oct 2025
Company leaders need to recognize the gravity of cyber risk, turn awareness into action, and put security front and center
Tue, 07 Oct 2025
Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.
Mon, 06 Oct 2025
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
Fri, 03 Oct 2025
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates
Thu, 02 Oct 2025
We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals
Wed, 01 Oct 2025
The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans
Mon, 29 Sep 2025
You could be getting more than you bargained for when you download that cheat tool promising quick wins
Fri, 26 Sep 2025
Malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers
Thu, 25 Sep 2025
What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware
Mon, 22 Sep 2025
Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
Fri, 19 Sep 2025
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
Thu, 18 Sep 2025
HybridPetya is the fourth publicly known real or proof-of-concept bootkit with UEFI Secure Boot bypass functionality
Tue, 16 Sep 2025
UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal
Fri, 12 Sep 2025
As bad actors often simply waltz through companies’ digital front doors with a key, here’s how to keep your own door locked tight
Thu, 11 Sep 2025
Given the serious financial and reputational risks of incidents that grind business to a halt, organizations need to prioritize a prevention-first cybersecurity strategy
Tue, 09 Sep 2025
As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your data protection strategy is fit for purpose
Fri, 05 Sep 2025
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS module that manipulates Google search results
Thu, 04 Sep 2025
From Meta shutting down millions of WhatsApp accounts linked to scam centers all the way to attacks at water facilities in Europe, August 2025 saw no shortage of impactful cybersecurity news
Thu, 28 Aug 2025
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back
Wed, 27 Aug 2025
The discovery of PromptLock shows how malicious use of AI models could supercharge ransomware and other threats
Tue, 26 Aug 2025
Separating truth from fiction is the first step towards making better parenting decisions. Let’s puncture some of the most common misconceptions about online harassment.
Thu, 21 Aug 2025
How top-tier managed detection and response (MDR) can help organizations stay ahead of increasingly agile and determined adversaries
Tue, 19 Aug 2025
Can you tell the difference between legitimate marketing and deepfake scam ads? It’s not always as easy as you may think.
Mon, 18 Aug 2025
Does your business truly understand its dependencies, and how to mitigate the risks posed by an attack on them?
Tue, 12 Aug 2025
Digital natives are comfortable with technology, but may be more exposed to online scams and other threats than they think
Tue, 12 Aug 2025
The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds
Mon, 11 Aug 2025
ESET Research discovered a zero-day vulnerability in WinRAR being exploited in the wild in the guise of job application documents; the weaponized archives exploited a path traversal flaw to compromise their targets
Mon, 11 Aug 2025
A sky-high premium may not always reflect your company’s security posture
Fri, 08 Aug 2025
Is your phone suddenly flooded with aggressive ads, slowing down performance or leading to unusual app behavior? Here’s what to do.
Fri, 08 Aug 2025
Who’s to blame when the AI tool managing a company’s compliance status gets it wrong?
Thu, 07 Aug 2025
Success in cybersecurity is when nothing happens, plus other standout themes from two of the event’s keynotes
Thu, 07 Aug 2025
Threat actors are embracing ClickFix, ransomware gangs are turning on each other – toppling even the leaders – and law enforcement is disrupting one infostealer after another
Tue, 05 Aug 2025
Here's what you need to know about the inner workings of modern spyware and how to stay away from apps that know too much
Fri, 01 Aug 2025
Restricting end-to-end encryption on a single-country basis would not only be absurdly difficult to enforce, but it would also fail to deter criminal activity
Fri, 01 Aug 2025
Here's a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025
Thu, 31 Jul 2025
Not all browser add-ons are handy helpers – some may contain far more than you have bargained for
Tue, 29 Jul 2025
The ToolShell bugs are being exploited by cybercriminals and APT groups alike, with the US on the receiving end of 13 percent of all attacks
Fri, 25 Jul 2025
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities
Thu, 24 Jul 2025
Before rushing to prove that you're not a robot, be wary of deceptive human verification pages as an increasingly popular vector for delivering malware
Thu, 24 Jul 2025
Behind every free online service, there's a price being paid. Learn why your digital footprint is so valuable, and when you might actually be the product.
Tue, 22 Jul 2025
ESET researchers map out the labyrinthine relationships among the vast hierarchy of AsyncRAT variants
Tue, 15 Jul 2025
Cracking the code of a successful cybersecurity career starts here. Hear from ESET's Robert Lipovsky as he reveals how to break into and thrive in this fast-paced field.
Fri, 04 Jul 2025
Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played by gamified job scams.
Fri, 04 Jul 2025
Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling victim to cyberattacks
Thu, 03 Jul 2025
ESET Research analyzes Gamaredon’s updated cyberespionage toolset, new stealth-focused techniques, and aggressive spearphishing operations observed throughout 2024
Wed, 02 Jul 2025
ESET Chief Security Evangelist Tony Anscombe looks at some of the report's standout findings and their implications for organizations in 2025
Tue, 01 Jul 2025
ESET experts discuss Sandworm’s new data wiper, relentless campaigns by UnsolicitedBooker, attribution challenges amid tool-sharing, and other key findings from the latest APT Activity Report
Tue, 01 Jul 2025
From Australia's new ransomware payment disclosure rules to another record-breaking DDoS attack, June 2025 saw no shortage of interesting cybersecurity news
Sat, 28 Jun 2025
A view of the H1 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts
Thu, 26 Jun 2025
ESET researchers analyzed a cyberespionage campaign conducted by BladedFeline, an Iran-aligned APT group with likely ties to OilRig
Thu, 05 Jun 2025
Do you have online accounts you haven't used in years? If so, a bit of digital spring cleaning might be in order.
Mon, 02 Jun 2025
From a flurry of attacks targeting UK retailers to campaigns corralling end-of-life routers into botnets, it's a wrap on another month filled with impactful cybersecurity news
Fri, 30 May 2025
Cybercriminals impersonate the trusted e-signature brand and send fake Docusign notifications to trick people into giving away their personal or corporate data
Tue, 27 May 2025
ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure
Fri, 23 May 2025
ESET Research shares its findings on the workings of Danabot, an infostealer recently disrupted in a multinational law enforcement operation
Thu, 22 May 2025
The bustling cybercrime enterprise has been dealt a significant blow in a global operation that relied on the expertise of ESET and other technology companies
Thu, 22 May 2025
Our intense monitoring of tens of thousands of malicious samples helped this global disruption operation
Wed, 21 May 2025
ESET Chief Security Evangelist Tony Anscombe highlights key findings from the latest issue of the ESET APT Activity Report
Mon, 19 May 2025
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025
Mon, 19 May 2025
Operation RoundPress targets webmail software to steal secrets from email accounts belonging mainly to governmental organizations in Ukraine and defense contractors in the EU
Thu, 15 May 2025
ESET researchers uncover a Russia-aligned espionage operation targeting webmail servers via XSS vulnerabilities
Thu, 15 May 2025
Ever wondered why a lie can spread faster than the truth? Tune in for an insightful look at disinformation and how we can fight one of the most pressing challenges facing our digital world.
Mon, 12 May 2025
Here’s a brief dive into the murky waters of shape-shifting attacks that leverage dedicated phishing kits to auto-generate customized login pages on the fly
Fri, 09 May 2025
When we get the call, it’s our legal responsibility to attend jury service. But sometimes that call won’t come from the courts – it will be a scammer.
Wed, 07 May 2025
Have you received a text message about an unpaid road toll? Make sure you’re not the next victim of a smishing scam.
Tue, 06 May 2025
From the power of collaborative defense to identity security and AI, catch up on the event's key themes and discussions
Fri, 02 May 2025
ESET researchers analyzed Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks
Wed, 30 Apr 2025
From the near-demise of MITRE's CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity
Tue, 29 Apr 2025
Your iPhone isn't necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors.
Mon, 28 Apr 2025
Look out for AI-generated 'TikDocs' who exploit the public's trust in the medical profession to drive sales of sketchy supplements
Fri, 25 Apr 2025
The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe.
Wed, 23 Apr 2025
What practical AI attacks exist today? “More than zero” is the answer – and they’re getting better.
Tue, 22 Apr 2025
Cybercriminals lure content creators with promises of cutting-edge AI wizardry, only to attempt to steal their data or hijack their devices instead
Thu, 17 Apr 2025
Here's what to know about malware that raids email accounts, web browsers, crypto wallets, and more – all in a quest for your sensitive data
Wed, 16 Apr 2025
Academic institutions have a unique set of characteristics that makes them attractive to bad actors. What's the right antidote to cyber-risk?
Mon, 14 Apr 2025
Here’s how to avoid being hit by fraudulent websites that scammers can catapult directly to the top of your search results
Thu, 10 Apr 2025
When a ruse puts on a familiar face, your guard might drop, making you an easy mark. Learn how to tell a friend apart from a foe.
Wed, 09 Apr 2025
Corporate data breaches are a gateway to identity fraud, but they’re not the only one. Here’s a lowdown on how your personal data could be stolen – and how to make sure it isn’t.
Tue, 08 Apr 2025
The computer scientist and AI researcher shares her thoughts on the technology’s potential and pitfalls – and what may lie ahead for us
Thu, 03 Apr 2025