www.welivesecurity.com
Open in
urlscan Pro
2a02:26f0:3500:12::1730:1797
Public Scan
Submitted URL: http://www.welivesecurity.com/
Effective URL: https://www.welivesecurity.com/en/
Submission: On November 03 via api from DE — Scanned from DE
Effective URL: https://www.welivesecurity.com/en/
Submission: On November 03 via api from DE — Scanned from DE
Form analysis
3 forms found in the DOMGET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
GET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
POST https://enjoy.eset.com/pub/rf
<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter px-0" target="_blank" method="post" role="search">
<div class="search-input clearfix"><input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Your Email Address" required=""><input type="checkbox" id="TOPIC" name="TOPIC" value="We Live Security Ukraine Newsletter"><label for="TOPIC">Ukraine
Crisis newsletter</label><input type="checkbox" id="NEWSLETTER" name="NEWSLETTER" value="We Live Security"><label for="NEWSLETTER">Regular weekly newsletter</label><input type="hidden" name="_ri_"
value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3"><input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY"><input type="hidden"
name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0"><input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="0"><input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form"><button type="submit"
class="redirect-button primary">Subscribe</button></div>
</form>
Text Content
Award-winning news, views, and insight from the ESET security community English Español Deutsch Português Français * * TIPS & ADVICE -------------------------------------------------------------------------------- * BUSINESS SECURITY -------------------------------------------------------------------------------- * ESET RESEARCH About ESET ResearchBlogpostsPodcastsWhite papersThreat reports -------------------------------------------------------------------------------- * WeLiveScience -------------------------------------------------------------------------------- * FEATURED Ukraine crisis – Digital security resource centerWeLiveProgressCOVID-19ResourcesVideos -------------------------------------------------------------------------------- * TOPICS Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet of ThingsMalwareRansomwareSecure codingMobile securityCritical infrastructureThreat research -------------------------------------------------------------------------------- * ABOUT US About WeLiveSecurityOur ExpertsContact Us -------------------------------------------------------------------------------- * English EspañolDeutschPortuguêsFrançais * Award-winning news, views, and insight from the ESET security community Anh Ho • 28 Oct 2024 • 12 min. read ESET Research CloudScout: Evasive Panda scouting cloud services Anh Ho • 28 Oct 2024 • 12 min. read ESET Research • 24 Oct 2024 • 1 min. read ESET Research ESET Research Podcast: CosmicBeetle ESET Research • 24 Oct 2024 • 1 min. read Jan Holman and Tomáš Zvara • 23 Oct 2024 • 15 min. read ESET Research Embargo ransomware: Rock’n’Rust Jan Holman and Tomáš Zvara • 23 Oct 2024 • 15 min. read Next Business Security Untangling the hiring dilemma: How security solutions free up HR processes Business Security MDR: Unlocking the power of enterprise-grade security for businesses of all sizes LATEST ARTICLES Video Month in security with Tony Anscombe – October 2024 edition Video Month in security with Tony Anscombe – October 2024 edition Election interference, American Water and the Internet Archive breaches, new cybersecurity laws, and more – October saw no shortage of impactful cybersecurity news stories Editor • 31 Oct 2024 -------------------------------------------------------------------------------- How To How to remove your personal information from Google Search results How To How to remove your personal information from Google Search results Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the removal of your personal information from search results. Márk Szabó • 30 Oct 2024 -------------------------------------------------------------------------------- Cybercrime Don't become a statistic: Tips to help keep your personal data off the dark web Cybercrime Don't become a statistic: Tips to help keep your personal data off the dark web You may not always stop your personal information from ending up in the internet’s dark recesses, but you can take steps to protect yourself from criminals looking to exploit it Phil Muncaster • 29 Oct 2024 -------------------------------------------------------------------------------- We Live Science Tony Fadell: Innovating to save our planet | Starmus highlights We Live Science Tony Fadell: Innovating to save our planet | Starmus highlights As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts Editor • 28 Oct 2024 -------------------------------------------------------------------------------- ESET Research CloudScout: Evasive Panda scouting cloud services ESET Research CloudScout: Evasive Panda scouting cloud services ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services Anh Ho • 28 Oct 2024 -------------------------------------------------------------------------------- ESET Research ESET Research Podcast: CosmicBeetle ESET Research ESET Research Podcast: CosmicBeetle Learn how a rather clumsy cybercrime group wielding buggy malicious tools managed to compromise a number of SMBs in various parts of the world ESET Research • 24 Oct 2024 -------------------------------------------------------------------------------- ESET Research Embargo ransomware: Rock’n’Rust ESET Research Embargo ransomware: Rock’n’Rust Novice ransomware group Embargo is testing and deploying a new Rust-based toolkit Jan Holman and Tomáš Zvara • 23 Oct 2024 -------------------------------------------------------------------------------- Scams Google Voice scams: What are they and how do I avoid them? Scams Google Voice scams: What are they and how do I avoid them? Watch out for schemes where fraudsters trick people into sharing verification codes so they can gain access to their phone numbers Phil Muncaster • 21 Oct 2024 -------------------------------------------------------------------------------- Video Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe Video Threat actors exploiting zero-days faster than ever – Week in security with Tony Anscombe The average time it takes attackers to weaponize a vulnerability, either before or after a patch is released, shrank from 63 days in 2018-2019 to just five days last year Editor • 18 Oct 2024 -------------------------------------------------------------------------------- Video, Kids Online Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7) Video, Kids Online Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7) “Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an adult to a child online – and even be the start of a predatory relationship Editor • 16 Oct 2024 -------------------------------------------------------------------------------- Scams Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes Scams Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes Ever alert to fresh money-making opportunities, fraudsters are blending physical and digital threats to steal drivers’ payment details Phil Muncaster • 15 Oct 2024 -------------------------------------------------------------------------------- Digital Security Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships Digital Security Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships The world needs more cybersecurity professionals – here are three great ways to give you an ‘in’ to the ever-growing and rewarding security industry Imogen Byers • 14 Oct 2024 * < * 1 * ... * 2 * 3 * 4 * ... * 543 * > -------------------------------------------------------------------------------- LET US KEEP YOU UP TO DATE Sign up for our newsletters Ukraine Crisis newsletterRegular weekly newsletterSubscribe FOLLOW US Award-winning news, views, and insight from the ESET security community About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS Feed Copyright © ESET, All Rights Reserved Your account, your cookies choice We and our partners use cookies to give you the best optimized online experience, analyze our website traffic, and serve you with personalized ads. You can agree to the collection of all cookies by clicking "Accept all and close" or adjust your cookie settings by clicking "Manage cookies". You also have the right to withdraw your consent to cookies anytime. For more information, please see our Cookie Policy. Accept all and close Manage cookies Essential cookies These first-party cookies are necessary for the functioning and security of our website and the services you require. They are usually set in response to your actions to enable the use of certain functionality, such as remembering your cookie preferences, logging in, or holding items in your cart. You can´t opt out of these cookies, and blocking them via a browser may affect site functionality. Basic Analytical Cookies These first-party cookies enable us to measure the number of visitors/users of our website and create aggregated usage and performance statistics with the help of our trusted partners. We use them to get the basic insight into our website traffic and our campaign performance and to solve bugs on our website. Advanced Analytical Cookies These first or third-party cookies help us understand how you interact with our website and each offered service by enriching our datasets with data from third-party tools. We use these cookies to improve our website, services, and user experience, find and solve bugs or other problems with them, and evaluate our campaigns´ effectiveness. Marketing cookies These third-party cookies allow our marketing partners to track some of your activities on our website (for example, when you download or buy our product) to learn about your interests and needs and to show you more relevant targeted ads. Accept and close Back