www.welivesecurity.com Open in urlscan Pro
2a02:26f0:3500:12::1730:1797  Public Scan

Submitted URL: http://www.welivesecurity.com/
Effective URL: https://www.welivesecurity.com/en/
Submission: On November 03 via api from DE — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://www.welivesecurity.com/en/search

<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
  <div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
      placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>

GET https://www.welivesecurity.com/en/search

<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
  <div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
      placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter px-0" target="_blank" method="post" role="search">
  <div class="search-input clearfix"><input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Your Email Address" required=""><input type="checkbox" id="TOPIC" name="TOPIC" value="We Live Security Ukraine Newsletter"><label for="TOPIC">Ukraine
      Crisis newsletter</label><input type="checkbox" id="NEWSLETTER" name="NEWSLETTER" value="We Live Security"><label for="NEWSLETTER">Regular weekly newsletter</label><input type="hidden" name="_ri_"
      value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3"><input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY"><input type="hidden"
      name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0"><input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="0"><input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form"><button type="submit"
      class="redirect-button primary">Subscribe</button></div>
</form>

Text Content

Award-winning news, views, and insight from the ESET security community

English
Español
Deutsch
Português
Français

 * 
 * TIPS & ADVICE

   --------------------------------------------------------------------------------

 * BUSINESS SECURITY

   --------------------------------------------------------------------------------

 * ESET RESEARCH
   About ESET ResearchBlogpostsPodcastsWhite papersThreat reports

   --------------------------------------------------------------------------------

 * WeLiveScience

   --------------------------------------------------------------------------------

 * FEATURED
   Ukraine crisis – Digital security resource
   centerWeLiveProgressCOVID-19ResourcesVideos

   --------------------------------------------------------------------------------

 * TOPICS
   Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet
   of ThingsMalwareRansomwareSecure codingMobile securityCritical
   infrastructureThreat research

   --------------------------------------------------------------------------------

 * ABOUT US
   About WeLiveSecurityOur ExpertsContact Us

   --------------------------------------------------------------------------------

 * English
   EspañolDeutschPortuguêsFrançais
 * 



Award-winning news, views, and insight from the ESET security community

Anh Ho • 28 Oct 2024 • 12 min. read

ESET Research

CloudScout: Evasive Panda scouting cloud services

Anh Ho • 28 Oct 2024 • 12 min. read

ESET Research • 24 Oct 2024 • 1 min. read

ESET Research

ESET Research Podcast: CosmicBeetle

ESET Research • 24 Oct 2024 • 1 min. read

Jan Holman and Tomáš Zvara • 23 Oct 2024 • 15 min. read

ESET Research

Embargo ransomware: Rock’n’Rust

Jan Holman and Tomáš Zvara • 23 Oct 2024 • 15 min. read


Next

Business Security

Untangling the hiring dilemma: How security solutions free up HR processes

Business Security

MDR: Unlocking the power of enterprise-grade security for businesses of all
sizes


LATEST ARTICLES

Video

Month in security with Tony Anscombe – October 2024 edition



Video

Month in security with Tony Anscombe – October 2024 edition

Election interference, American Water and the Internet Archive breaches, new
cybersecurity laws, and more – October saw no shortage of impactful
cybersecurity news stories

Editor • 31 Oct 2024

--------------------------------------------------------------------------------

How To

How to remove your personal information from Google Search results



How To

How to remove your personal information from Google Search results

Have you ever googled yourself? Were you happy with what came up? If not,
consider requesting the removal of your personal information from search
results.

Márk Szabó • 30 Oct 2024

--------------------------------------------------------------------------------

Cybercrime

Don't become a statistic: Tips to help keep your personal data off the dark web



Cybercrime

Don't become a statistic: Tips to help keep your personal data off the dark web

You may not always stop your personal information from ending up in the
internet’s dark recesses, but you can take steps to protect yourself from
criminals looking to exploit it

Phil Muncaster • 29 Oct 2024

--------------------------------------------------------------------------------

We Live Science

Tony Fadell: Innovating to save our planet | Starmus highlights



We Live Science

Tony Fadell: Innovating to save our planet | Starmus highlights

As methane emissions come under heightened global scrutiny, learn how a
state-of-the-art satellite can pinpoint their sources and deliver the insights
needed for targeted mitigation efforts

Editor • 28 Oct 2024

--------------------------------------------------------------------------------

ESET Research

CloudScout: Evasive Panda scouting cloud services



ESET Research

CloudScout: Evasive Panda scouting cloud services

ESET researchers discovered a previously undocumented toolset used by Evasive
Panda to access and retrieve data from cloud services

Anh Ho • 28 Oct 2024

--------------------------------------------------------------------------------

ESET Research

ESET Research Podcast: CosmicBeetle



ESET Research

ESET Research Podcast: CosmicBeetle

Learn how a rather clumsy cybercrime group wielding buggy malicious tools
managed to compromise a number of SMBs in various parts of the world

ESET Research • 24 Oct 2024

--------------------------------------------------------------------------------

ESET Research

Embargo ransomware: Rock’n’Rust



ESET Research

Embargo ransomware: Rock’n’Rust

Novice ransomware group Embargo is testing and deploying a new Rust-based
toolkit

Jan Holman and Tomáš Zvara • 23 Oct 2024

--------------------------------------------------------------------------------

Scams

Google Voice scams: What are they and how do I avoid them?



Scams

Google Voice scams: What are they and how do I avoid them?

Watch out for schemes where fraudsters trick people into sharing verification
codes so they can gain access to their phone numbers

Phil Muncaster • 21 Oct 2024

--------------------------------------------------------------------------------

Video

Threat actors exploiting zero-days faster than ever – Week in security with Tony
Anscombe



Video

Threat actors exploiting zero-days faster than ever – Week in security with Tony
Anscombe

The average time it takes attackers to weaponize a vulnerability, either before
or after a patch is released, shrank from 63 days in 2018-2019 to just five days
last year

Editor • 18 Oct 2024

--------------------------------------------------------------------------------

Video, Kids Online

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)



Video, Kids Online

Protecting children from grooming | Unlocked 403 cybersecurity podcast (ep. 7)

“Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it
comes from an adult to a child online – and even be the start of a predatory
relationship

Editor • 16 Oct 2024

--------------------------------------------------------------------------------

Scams

Quishing attacks are targeting electric car owners: Here’s how to slam on the
brakes



Scams

Quishing attacks are targeting electric car owners: Here’s how to slam on the
brakes

Ever alert to fresh money-making opportunities, fraudsters are blending physical
and digital threats to steal drivers’ payment details

Phil Muncaster • 15 Oct 2024

--------------------------------------------------------------------------------

Digital Security

Aspiring digital defender? Explore cybersecurity internships, scholarships and
apprenticeships



Digital Security

Aspiring digital defender? Explore cybersecurity internships, scholarships and
apprenticeships

The world needs more cybersecurity professionals – here are three great ways to
give you an ‘in’ to the ever-growing and rewarding security industry

Imogen Byers • 14 Oct 2024

 * <
 * 1
 * ...
 * 2
 * 3
 * 4
 * ...
 * 543
 * >

--------------------------------------------------------------------------------


LET US KEEP YOU
UP TO DATE

Sign up for our newsletters

Ukraine Crisis newsletterRegular weekly newsletterSubscribe


FOLLOW US



Award-winning news, views, and insight from the ESET security community

About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS
Feed

Copyright © ESET, All Rights Reserved
Your account, your cookies choice
We and our partners use cookies to give you the best optimized online
experience, analyze our website traffic, and serve you with personalized ads.
You can agree to the collection of all cookies by clicking "Accept all and
close" or adjust your cookie settings by clicking "Manage cookies". You also
have the right to withdraw your consent to cookies anytime. For more
information, please see our Cookie Policy.
Accept all and close
Manage cookies
Essential cookies
These first-party cookies are necessary for the functioning and security of our
website and the services you require. They are usually set in response to your
actions to enable the use of certain functionality, such as remembering your
cookie preferences, logging in, or holding items in your cart. You can´t opt out
of these cookies, and blocking them via a browser may affect site functionality.
Basic Analytical Cookies
These first-party cookies enable us to measure the number of visitors/users of
our website and create aggregated usage and performance statistics with the help
of our trusted partners. We use them to get the basic insight into our website
traffic and our campaign performance and to solve bugs on our website.
Advanced Analytical Cookies
These first or third-party cookies help us understand how you interact with our
website and each offered service by enriching our datasets with data from
third-party tools. We use these cookies to improve our website, services, and
user experience, find and solve bugs or other problems with them, and evaluate
our campaigns´ effectiveness.
Marketing cookies
These third-party cookies allow our marketing partners to track some of your
activities on our website (for example, when you download or buy our product) to
learn about your interests and needs and to show you more relevant targeted ads.
Accept and close
Back