www.welivesecurity.com
Open in
urlscan Pro
2a02:26f0:2780:6::214:f589
Public Scan
Submitted URL: http://blog.eset.com/
Effective URL: https://www.welivesecurity.com/en/
Submission: On December 16 via manual from GB — Scanned from GB
Effective URL: https://www.welivesecurity.com/en/
Submission: On December 16 via manual from GB — Scanned from GB
Form analysis
3 forms found in the DOMGET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
GET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
POST https://enjoy.eset.com/pub/rf
<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter px-0" target="_blank" method="post" role="search">
<div class="search-input clearfix"><input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Your Email Address" required=""><input type="checkbox" id="TOPIC" name="TOPIC" value="We Live Security Ukraine Newsletter"><label for="TOPIC">Ukraine
Crisis newsletter</label><input type="checkbox" id="NEWSLETTER" name="NEWSLETTER" value="We Live Security"><label for="NEWSLETTER">Regular weekly newsletter</label><input type="hidden" name="_ri_"
value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3"><input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY"><input type="hidden"
name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0"><input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="0"><input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form"><button type="submit"
class="redirect-button primary">Subscribe</button></div>
</form>
Text Content
Award-winning news, views, and insight from the ESET security community English Español Deutsch Português Français * * TIPS & ADVICE -------------------------------------------------------------------------------- * BUSINESS SECURITY -------------------------------------------------------------------------------- * ESET RESEARCH About ESET ResearchBlogpostsPodcastsWhite papersThreat reports -------------------------------------------------------------------------------- * WeLiveScience -------------------------------------------------------------------------------- * FEATURED Ukraine crisis – Digital security resource centerWeLiveProgressCOVID-19ResourcesVideos -------------------------------------------------------------------------------- * TOPICS Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet of ThingsMalwareRansomwareSecure codingMobile securityCritical infrastructureThreat research -------------------------------------------------------------------------------- * ABOUT US About WeLiveSecurityOur ExpertsContact Us -------------------------------------------------------------------------------- * English EspañolDeutschPortuguêsFrançais * Award-winning news, views, and insight from the ESET security community Privacy Black Hat Europe 2024: Hacking a car – or rather, its infotainment system Digital Security Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization Digital Security Black Hat Europe 2024: Can AI systems be socially engineered? Next Business Security Untangling the hiring dilemma: How security solutions free up HR processes Business Security MDR: Unlocking the power of enterprise-grade security for businesses of all sizes LATEST ARTICLES Privacy Black Hat Europe 2024: Hacking a car – or rather, its infotainment system Privacy Black Hat Europe 2024: Hacking a car – or rather, its infotainment system Our ‘computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow Tony Anscombe • 13 Dec 2024 -------------------------------------------------------------------------------- Digital Security Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization Digital Security Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems Tony Anscombe • 13 Dec 2024 -------------------------------------------------------------------------------- Digital Security Black Hat Europe 2024: Can AI systems be socially engineered? Digital Security Black Hat Europe 2024: Can AI systems be socially engineered? Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? Tony Anscombe • 12 Dec 2024 -------------------------------------------------------------------------------- Video, Business Security How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8) Video, Business Security How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8) As cybersecurity is a make-or-break proposition for businesses of all sizes, can your organization's security strategy keep pace with today’s rapidly evolving threats? Editor • 10 Dec 2024 -------------------------------------------------------------------------------- Mobile Security Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks Mobile Security Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost Phil Muncaster • 09 Dec 2024 -------------------------------------------------------------------------------- We Live Science Philip Torr: AI to the people | Starmus Highlights We Live Science Philip Torr: AI to the people | Starmus Highlights We’re on the cusp of a technological revolution that is poised to transform our lives – and we hold the power to shape its impact Editor • 05 Dec 2024 -------------------------------------------------------------------------------- Business Security Achieving cybersecurity compliance in 5 steps Business Security Achieving cybersecurity compliance in 5 steps Cybersecurity compliance may feel overwhelming, but a few clear steps can make it manageable and ensure your business stays on the right side of regulatory requirements Márk Szabó • 03 Dec 2024 -------------------------------------------------------------------------------- We Live Science Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus Highlights We Live Science Richard Marko: Rethinking cybersecurity in the age of global challenges | Starmus Highlights ESET's CEO unpacks the complexities of cybersecurity in today’s hyper-connected world and highlights the power of innovation in stopping digital threats in their tracks Editor • 02 Dec 2024 -------------------------------------------------------------------------------- Video Month in security with Tony Anscombe – November 2024 edition Video Month in security with Tony Anscombe – November 2024 edition Zero days under attack, a new advisory from 'Five Eyes', thousands of ICS units left exposed, and mandatory MFA for all – it's a wrap on another month filled with impactful cybersecurity news Editor • 29 Nov 2024 -------------------------------------------------------------------------------- Scams Scams to look out for this holiday season Scams Scams to look out for this holiday season ‘Tis the season to be wary – be on your guard and don’t let fraud ruin your shopping spree Phil Muncaster • 28 Nov 2024 -------------------------------------------------------------------------------- Video Bootkitty marks a new chapter in the evolution of UEFI threats Video Bootkitty marks a new chapter in the evolution of UEFI threats ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance against future threats Editor • 27 Nov 2024 -------------------------------------------------------------------------------- ESET Research Bootkitty: Analyzing the first UEFI bootkit for Linux ESET Research Bootkitty: Analyzing the first UEFI bootkit for Linux ESET researchers analyze the first UEFI bootkit designed for Linux systems Martin Smolár and Peter Strýček • 27 Nov 2024 * < * 1 * ... * 2 * 3 * 4 * ... * 544 * > -------------------------------------------------------------------------------- LET US KEEP YOU UP TO DATE Sign up for our newsletters Ukraine Crisis newsletterRegular weekly newsletterSubscribe FOLLOW US Award-winning news, views, and insight from the ESET security community About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS Feed Copyright © ESET, All Rights Reserved Your account, your cookies choice We and our partners use cookies to give you the best optimized online experience, analyze our website traffic, and serve you with personalized ads. You can agree to the collection of all cookies by clicking "Accept all and close" or adjust your cookie settings by clicking "Manage cookies". You also have the right to withdraw your consent to cookies anytime. For more information, please see our Cookie Policy. Accept all and close Manage cookies Essential cookies These first-party cookies are necessary for the functioning and security of our website and the services you require. They are usually set in response to your actions to enable the use of certain functionality, such as remembering your cookie preferences, logging in, or holding items in your cart. You can´t opt out of these cookies, and blocking them via a browser may affect site functionality. Basic Analytical Cookies These first-party cookies enable us to measure the number of visitors/users of our website and create aggregated usage and performance statistics with the help of our trusted partners. We use them to get the basic insight into our website traffic and our campaign performance and to solve bugs on our website. Advanced Analytical Cookies These first or third-party cookies help us understand how you interact with our website and each offered service by enriching our datasets with data from third-party tools. We use these cookies to improve our website, services, and user experience, find and solve bugs or other problems with them, and evaluate our campaigns´ effectiveness. Marketing cookies These third-party cookies allow our marketing partners to track some of your activities on our website (for example, when you download or buy our product) to learn about your interests and needs and to show you more relevant targeted ads. Accept and close Back