We Live Security

WeLiveSecurity
  1. Attributing a cyberattack to a specific threat actor is a complex affair, as evidenced by new ESET research published this week
  2. Building efficient recovery options will drive ecosystem resilience
  3. ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia
  4. ESET research examines the group's malicious wares as used to spy on targets in Ukraine in the past two years
  5. Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices
  6. Keep your cool, arm yourself with the right knowledge, and other tips for staying unshaken by fraudsters’ scare tactics
  7. With just weeks to go before the US presidential election, the FBI and the CISA are warning about attempts to sow distrust in the electoral process
  8. Here’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the app
  9. How do analyst relations professionals sort through the noise to help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find out.
  10. Proper disclosure of a cyber-incident can help shield your business from further financial and reputational damage, and cyber-insurers can step in to help

logo joomla Open Source CMS   logo Magento Open Source eCommerce     logo Paypal Credit Card Processinglogo Adobe Illustrator & Photoshoplogo Google Analytics & Adwords

Login Form