Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

We Live Security » Languages » English

Get the latest updates from We Live Security » Languages » English directly as they happen.

Follow now 605 followers

Latest posts

Last updated about 23 hours ago

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

1 day ago

Being seen as reliable is good for ‘business’ and ransomware groups care...

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

2 days ago

If you don’t look inside your environment, you can’t know its true...

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

3 days ago

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts...

The big catch: How whaling attacks target top executives

4 days ago

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to...

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

9 days ago

Identity is effectively the new network boundary. It must be protected at...

MuddyWater: Snakes by the riverbank

11 days ago

MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware...

Oversharing is not caring: What’s at stake if your employees post too much online

12 days ago

From LinkedIn to X, GitHub to Instagram, there are plenty of opportunities...

This month in security with Tony Anscombe – November 2025 edition

15 days ago

Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame...

What parents should know to protect their children from doxxing

16 days ago

Online disagreements among young people can easily spiral out of control. Parents...

Influencers in the crosshairs: How cybercriminals are targeting content creators

18 days ago

Social media influencers can provide reach and trust for scams and malware...

MDR is the answer – now, what’s the question?

19 days ago

Why your business needs the best-of-breed combination of technology and human expertise

The OSINT playbook: Find your weak spots before attackers do

23 days ago

Here’s how open-source intelligence helps trace your digital footprint and uncover your...