Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

We Live Security » Languages » English

Get the latest updates from We Live Security » Languages » English directly as they happen.

Follow now 607 followers

Latest posts

Last updated about 1 hour ago

Credential stuffing: What it is and how to protect yourself

about 23 hours ago

Reusing passwords may feel like a harmless shortcut – until a single...

This month in security with Tony Anscombe – December 2025 edition

11 days ago

As 2025 draws to a close, Tony looks back at the cybersecurity...

A brush with online fraud: What are brushing scams and how do I stay safe?

17 days ago

Have you ever received a package you never ordered? It could be...

Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component

18 days ago

A comprehensive analysis and assessment of a critical severity vulnerability with low...

LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan

22 days ago

ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy...

ESET Threat Report H2 2025

24 days ago

A view of the H2 2025 threat landscape as seen by ESET...

Black Hat Europe 2025: Was that device designed to be on the internet at all?

28 days ago

Behind the polished exterior of many modern buildings sit outdated systems with...

Black Hat Europe 2025: Reputation matters – even in the ransomware economy

29 days ago

Being seen as reliable is good for ‘business’ and ransomware groups care...

Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity

29 days ago

If you don’t look inside your environment, you can’t know its true...

Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece

30 days ago

Interpreting the vast cybersecurity vendor landscape through the lens of industry analysts...

The big catch: How whaling attacks target top executives

about 1 month ago

Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to...

Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture

about 1 month ago

Identity is effectively the new network boundary. It must be protected at...