www.welivesecurity.com
Open in
urlscan Pro
2a02:26f0:7100::1720:ee10
Public Scan
Submitted URL: http://www.welivesecurity.com/
Effective URL: https://www.welivesecurity.com/en/
Submission: On December 18 via api from NL — Scanned from NL
Effective URL: https://www.welivesecurity.com/en/
Submission: On December 18 via api from NL — Scanned from NL
Form analysis
3 forms found in the DOMGET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
GET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
POST https://enjoy.eset.com/pub/rf
<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter px-0" target="_blank" method="post" role="search">
<div class="search-input clearfix"><input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Your Email Address" required=""><input type="checkbox" id="TOPIC" name="TOPIC" value="We Live Security Ukraine Newsletter"><label for="TOPIC">Ukraine
Crisis newsletter</label><input type="checkbox" id="NEWSLETTER" name="NEWSLETTER" value="We Live Security"><label for="NEWSLETTER">Regular weekly newsletter</label><input type="hidden" name="_ri_"
value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3"><input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY"><input type="hidden"
name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0"><input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="0"><input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form"><button type="submit"
class="redirect-button primary">Subscribe</button></div>
</form>
Text Content
Award-winning news, views, and insight from the ESET security community English Español Deutsch Português Français * * TIPS & ADVICE -------------------------------------------------------------------------------- * BUSINESS SECURITY -------------------------------------------------------------------------------- * ESET RESEARCH About ESET ResearchBlogpostsPodcastsWhite papersThreat reports -------------------------------------------------------------------------------- * FEATURED Ukraine crisis – Digital security resource centerWe Live ProgressCOVID-19ResourcesVideos -------------------------------------------------------------------------------- * TOPICS Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet of ThingsMalwareRansomwareSecure codingMobile securityCritical infrastructureThreat research -------------------------------------------------------------------------------- * ABOUT US About WeLiveSecurityOur ExpertsContact Us -------------------------------------------------------------------------------- * English EspañolDeutschPortuguêsFrançais * Award-winning news, views, and insight from the ESET security community Zuzana Hromcová and Adam Burgher • 14 Dec 2023 • 22 min. read ESET Research OilRig’s persistent attacks using cloud service-powered downloaders Zuzana Hromcová and Adam Burgher • 14 Dec 2023 • 22 min. read Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023 • 7 min. read ESET Research A pernicious potpourri of Python packages in PyPI Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023 • 7 min. read Lukas Stefanko • 05 Dec 2023 • 21 min. read ESET Research Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths Lukas Stefanko • 05 Dec 2023 • 21 min. read Next Black Hat Europe 2023: The past could return to haunt you To tap or not to tap: Are NFC payments safer? LATEST ARTICLES New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe Your iPhone has just received a new feature called iMessage Contact Key Verification that is designed to help protect your messages from prying eyes Editor • 15 Dec 2023 -------------------------------------------------------------------------------- OilRig’s persistent attacks using cloud service-powered downloaders OilRig’s persistent attacks using cloud service-powered downloaders ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for C&C communications Zuzana Hromcová and Adam Burgher • 14 Dec 2023 -------------------------------------------------------------------------------- Delivering trust with DNS security Delivering trust with DNS security Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach? Alžbeta Kovaľová • 13 Dec 2023 -------------------------------------------------------------------------------- A pernicious potpourri of Python packages in PyPI A pernicious potpourri of Python packages in PyPI The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package repository Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023 -------------------------------------------------------------------------------- Black Hat Europe 2023: Should we regulate AI? Black Hat Europe 2023: Should we regulate AI? ChatGPT would probably say "Definitely not!", but will we learn any lessons from the rush to regulate IoT in the past? Tony Anscombe • 11 Dec 2023 -------------------------------------------------------------------------------- Silent but deadly: The rise of zero-click attacks Silent but deadly: The rise of zero-click attacks A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you – but this doesn’t mean you’re left vulnerable. Márk Szabó • 11 Dec 2023 -------------------------------------------------------------------------------- Surge in deceptive loan apps – Week in security with Tony Anscombe Surge in deceptive loan apps – Week in security with Tony Anscombe ESET Research reveals details about a growth in the number of deceptive loan apps on Android, their origins and modus operandi. Editor • 08 Dec 2023 -------------------------------------------------------------------------------- Black Hat Europe 2023: The past could return to haunt you Black Hat Europe 2023: The past could return to haunt you Legacy protocols in the healthcare industry present dangers that can make hospitals extremely vulnerable to cyberattacks. Tony Anscombe • 08 Dec 2023 -------------------------------------------------------------------------------- To tap or not to tap: Are NFC payments safer? To tap or not to tap: Are NFC payments safer? Contactless payments are quickly becoming ubiquitous – but are they more secure than traditional payment methods? Márk Szabó • 07 Dec 2023 -------------------------------------------------------------------------------- Navigating privacy: Should we put the brakes on car tracking? Navigating privacy: Should we put the brakes on car tracking? Your car probably knows a lot more about you than it lets on – but is the trade-off of privacy for convenience truly justifiable? Márk Szabó • 06 Dec 2023 -------------------------------------------------------------------------------- Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths ESET researchers describe the growth of deceptive loan apps for Android and techniques they use to circumvent Google Play Lukas Stefanko • 05 Dec 2023 -------------------------------------------------------------------------------- Teaching appropriate use of AI tech – Week in security with Tony Anscombe Teaching appropriate use of AI tech – Week in security with Tony Anscombe Several cases of children creating indecent images of other children using AI software add to the worries about harmful uses of AI technology Editor • 01 Dec 2023 * < * 1 * ... * 2 * 3 * 4 * ... * 527 * > -------------------------------------------------------------------------------- MOST POPULAR A pernicious potpourri of Python packages in PyPI -------------------------------------------------------------------------------- SnapHack: Watch out for those who can hack into anyone’s Snapchat! -------------------------------------------------------------------------------- OilRig’s persistent attacks using cloud service-powered downloaders -------------------------------------------------------------------------------- Silent but deadly: The rise of zero-click attacks -------------------------------------------------------------------------------- Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths -------------------------------------------------------------------------------- LET US KEEP YOU UP TO DATE Sign up for our newsletters Ukraine Crisis newsletterRegular weekly newsletterSubscribe FOLLOW US Award-winning news, views, and insight from the ESET security community About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS Feed Copyright © ESET, All Rights Reserved Your account, your cookies choice We and our partners use cookies to give you the best optimized online experience, analyze our website traffic, and serve you with personalized ads. You can agree to the collection of all cookies by clicking "Accept all and close" or adjust your cookie settings by clicking "Manage cookies". You also have the right to withdraw your consent to cookies anytime. For more information, please see our Cookie Policy. Accept all and close Manage cookies Essential cookies These first-party cookies are necessary for the functioning and security of our website and the services you require. They are usually set in response to your actions to enable the use of certain functionality, such as remembering your cookie preferences, logging in, or holding items in your cart. You can´t opt out of these cookies, and blocking them via a browser may affect site functionality. Basic Analytical Cookies These first-party cookies enable us to measure the number of visitors/users of our website and create aggregated usage and performance statistics with the help of our trusted partners. We use them to get the basic insight into our website traffic and our campaign performance and to solve bugs on our website. Advanced Analytical Cookies These first or third-party cookies help us understand how you interact with our website and each offered service by enriching our datasets with data from third-party tools. We use these cookies to improve our website, services, and user experience, find and solve bugs or other problems with them, and evaluate our campaigns´ effectiveness. Marketing cookies These third-party cookies allow our marketing partners to track some of your activities on our website (for example, when you download or buy our product) to learn about your interests and needs and to show you more relevant targeted ads. Accept and close Back