Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

We Live Security » Languages » English

Get the latest updates from We Live Security » Languages » English directly as they happen.

Follow now 606 followers

Latest posts

Last updated 3 days ago

A brush with online fraud: What are brushing scams and how do I stay safe?

4 days ago

Have you ever received a package you never ordered? It could be...

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

5 days ago

A comprehensive analysis and assessment of a critical severity vulnerability with low...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

9 days ago

ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy...

ESET Threat Report H2 2025

11 days ago

A view of the H2 2025 threat landscape as seen by ESET...

Black Hat Europe 2025: Was that device designed to be on the internet at all?

15 days ago

Behind the polished exterior of many modern buildings sit outdated systems with...

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

16 days ago

Being seen as reliable is good for ‘business’ and ransomware groups care...

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

16 days ago

If you don’t look inside your environment, you can’t know its true...

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

17 days ago

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts...

The big catch: How whaling attacks target top executives

18 days ago

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to...

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

23 days ago

Identity is effectively the new network boundary. It must be protected at...

MuddyWater: Snakes by the riverbank

25 days ago

MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware...

Oversharing is not caring: What’s at stake if your employees post too much online

26 days ago

From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities...