www.welivesecurity.com Open in urlscan Pro
2a02:26f0:7100::1720:ee10  Public Scan

Submitted URL: http://www.welivesecurity.com/
Effective URL: https://www.welivesecurity.com/en/
Submission: On December 18 via api from NL — Scanned from NL

Form analysis 3 forms found in the DOM

GET https://www.welivesecurity.com/en/search

<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
  <div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
      placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>

GET https://www.welivesecurity.com/en/search

<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
  <div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
      placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter px-0" target="_blank" method="post" role="search">
  <div class="search-input clearfix"><input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Your Email Address" required=""><input type="checkbox" id="TOPIC" name="TOPIC" value="We Live Security Ukraine Newsletter"><label for="TOPIC">Ukraine
      Crisis newsletter</label><input type="checkbox" id="NEWSLETTER" name="NEWSLETTER" value="We Live Security"><label for="NEWSLETTER">Regular weekly newsletter</label><input type="hidden" name="_ri_"
      value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3"><input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY"><input type="hidden"
      name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0"><input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="0"><input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form"><button type="submit"
      class="redirect-button primary">Subscribe</button></div>
</form>

Text Content

Award-winning news, views, and insight from the ESET security community

English
Español
Deutsch
Português
Français

 * 
 * TIPS & ADVICE

   --------------------------------------------------------------------------------

 * BUSINESS SECURITY

   --------------------------------------------------------------------------------

 * ESET RESEARCH
   About ESET ResearchBlogpostsPodcastsWhite papersThreat reports

   --------------------------------------------------------------------------------

 * FEATURED
   Ukraine crisis – Digital security resource centerWe Live
   ProgressCOVID-19ResourcesVideos

   --------------------------------------------------------------------------------

 * TOPICS
   Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet
   of ThingsMalwareRansomwareSecure codingMobile securityCritical
   infrastructureThreat research

   --------------------------------------------------------------------------------

 * ABOUT US
   About WeLiveSecurityOur ExpertsContact Us

   --------------------------------------------------------------------------------

 * English
   EspañolDeutschPortuguêsFrançais
 * 



Award-winning news, views, and insight from the ESET security community

Zuzana Hromcová and Adam Burgher • 14 Dec 2023 • 22 min. read

ESET Research

OilRig’s persistent attacks using cloud service-powered downloaders

Zuzana Hromcová and Adam Burgher • 14 Dec 2023 • 22 min. read

Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023 • 7 min. read

ESET Research

A pernicious potpourri of Python packages in PyPI

Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023 • 7 min. read

Lukas Stefanko • 05 Dec 2023 • 21 min. read

ESET Research

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

Lukas Stefanko • 05 Dec 2023 • 21 min. read


Next

Black Hat Europe 2023: The past could return to haunt you

To tap or not to tap: Are NFC payments safer?


LATEST ARTICLES

New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe



New iOS feature to thwart eavesdropping – Week in security with Tony Anscombe

Your iPhone has just received a new feature called iMessage Contact Key
Verification that is designed to help protect your messages from prying eyes

Editor • 15 Dec 2023

--------------------------------------------------------------------------------

OilRig’s persistent attacks using cloud service-powered downloaders



OilRig’s persistent attacks using cloud service-powered downloaders

ESET researchers document a series of new OilRig downloaders, all relying on
legitimate cloud service providers for C&C communications

Zuzana Hromcová and Adam Burgher • 14 Dec 2023

--------------------------------------------------------------------------------

Delivering trust with DNS security



Delivering trust with DNS security

Can DNS protection technology transform consumers’ worries about cybercrime with
a trust-based approach?

Alžbeta Kovaľová • 13 Dec 2023

--------------------------------------------------------------------------------

A pernicious potpourri of Python packages in PyPI



A pernicious potpourri of Python packages in PyPI

The past year has seen over 10,000 downloads of malicious packages hosted on the
official Python package repository

Marc-Etienne M.Léveillé and Rene Holt • 12 Dec 2023

--------------------------------------------------------------------------------

Black Hat Europe 2023: Should we regulate AI?



Black Hat Europe 2023: Should we regulate AI?

ChatGPT would probably say "Definitely not!", but will we learn any lessons from
the rush to regulate IoT in the past?

Tony Anscombe • 11 Dec 2023

--------------------------------------------------------------------------------

Silent but deadly: The rise of zero-click attacks



Silent but deadly: The rise of zero-click attacks

A security compromise so stealthy that it doesn’t even require your interaction?
Yes, zero-click attacks require no action from you – but this doesn’t mean
you’re left vulnerable.

Márk Szabó • 11 Dec 2023

--------------------------------------------------------------------------------

Surge in deceptive loan apps – Week in security with Tony Anscombe



Surge in deceptive loan apps – Week in security with Tony Anscombe

ESET Research reveals details about a growth in the number of deceptive loan
apps on Android, their origins and modus operandi.

Editor • 08 Dec 2023

--------------------------------------------------------------------------------

Black Hat Europe 2023: The past could return to haunt you



Black Hat Europe 2023: The past could return to haunt you

Legacy protocols in the healthcare industry present dangers that can make
hospitals extremely vulnerable to cyberattacks.

Tony Anscombe • 08 Dec 2023

--------------------------------------------------------------------------------

To tap or not to tap: Are NFC payments safer?



To tap or not to tap: Are NFC payments safer?

Contactless payments are quickly becoming ubiquitous – but are they more secure
than traditional payment methods?

Márk Szabó • 07 Dec 2023

--------------------------------------------------------------------------------

Navigating privacy: Should we put the brakes on car tracking?



Navigating privacy: Should we put the brakes on car tracking?

Your car probably knows a lot more about you than it lets on – but is the
trade-off of privacy for convenience truly justifiable?

Márk Szabó • 06 Dec 2023

--------------------------------------------------------------------------------

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths



Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

ESET researchers describe the growth of deceptive loan apps for Android and
techniques they use to circumvent Google Play

Lukas Stefanko • 05 Dec 2023

--------------------------------------------------------------------------------

Teaching appropriate use of AI tech – Week in security with Tony Anscombe



Teaching appropriate use of AI tech – Week in security with Tony Anscombe

Several cases of children creating indecent images of other children using AI
software add to the worries about harmful uses of AI technology

Editor • 01 Dec 2023

 * <
 * 1
 * ...
 * 2
 * 3
 * 4
 * ...
 * 527
 * >

--------------------------------------------------------------------------------


MOST POPULAR

A pernicious potpourri of Python packages in PyPI



--------------------------------------------------------------------------------

SnapHack: Watch out for those who can hack into anyone’s Snapchat!



--------------------------------------------------------------------------------

OilRig’s persistent attacks using cloud service-powered downloaders



--------------------------------------------------------------------------------

Silent but deadly: The rise of zero-click attacks



--------------------------------------------------------------------------------

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths



--------------------------------------------------------------------------------





LET US KEEP YOU
UP TO DATE

Sign up for our newsletters

Ukraine Crisis newsletterRegular weekly newsletterSubscribe


FOLLOW US



Award-winning news, views, and insight from the ESET security community

About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS
Feed

Copyright © ESET, All Rights Reserved
Your account, your cookies choice
We and our partners use cookies to give you the best optimized online
experience, analyze our website traffic, and serve you with personalized ads.
You can agree to the collection of all cookies by clicking "Accept all and
close" or adjust your cookie settings by clicking "Manage cookies". You also
have the right to withdraw your consent to cookies anytime. For more
information, please see our Cookie Policy.
Accept all and close
Manage cookies
Essential cookies
These first-party cookies are necessary for the functioning and security of our
website and the services you require. They are usually set in response to your
actions to enable the use of certain functionality, such as remembering your
cookie preferences, logging in, or holding items in your cart. You can´t opt out
of these cookies, and blocking them via a browser may affect site functionality.
Basic Analytical Cookies
These first-party cookies enable us to measure the number of visitors/users of
our website and create aggregated usage and performance statistics with the help
of our trusted partners. We use them to get the basic insight into our website
traffic and our campaign performance and to solve bugs on our website.
Advanced Analytical Cookies
These first or third-party cookies help us understand how you interact with our
website and each offered service by enriching our datasets with data from
third-party tools. We use these cookies to improve our website, services, and
user experience, find and solve bugs or other problems with them, and evaluate
our campaigns´ effectiveness.
Marketing cookies
These third-party cookies allow our marketing partners to track some of your
activities on our website (for example, when you download or buy our product) to
learn about your interests and needs and to show you more relevant targeted ads.
Accept and close
Back