www.welivesecurity.com Open in urlscan Pro
2a02:26f0:2780:6::214:f589  Public Scan

Submitted URL: http://blog.eset.com/
Effective URL: https://www.welivesecurity.com/en/
Submission: On December 16 via manual from GB — Scanned from GB

Form analysis 3 forms found in the DOM

GET https://www.welivesecurity.com/en/search

<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
  <div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
      placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>

GET https://www.welivesecurity.com/en/search

<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
  <div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
      placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>

POST https://enjoy.eset.com/pub/rf

<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter px-0" target="_blank" method="post" role="search">
  <div class="search-input clearfix"><input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Your Email Address" required=""><input type="checkbox" id="TOPIC" name="TOPIC" value="We Live Security Ukraine Newsletter"><label for="TOPIC">Ukraine
      Crisis newsletter</label><input type="checkbox" id="NEWSLETTER" name="NEWSLETTER" value="We Live Security"><label for="NEWSLETTER">Regular weekly newsletter</label><input type="hidden" name="_ri_"
      value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3"><input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY"><input type="hidden"
      name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0"><input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="0"><input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form"><button type="submit"
      class="redirect-button primary">Subscribe</button></div>
</form>

Text Content

Award-winning news, views, and insight from the ESET security community

English
Español
Deutsch
Português
Français

 * 
 * TIPS & ADVICE

   --------------------------------------------------------------------------------

 * BUSINESS SECURITY

   --------------------------------------------------------------------------------

 * ESET RESEARCH
   About ESET ResearchBlogpostsPodcastsWhite papersThreat reports

   --------------------------------------------------------------------------------

 * WeLiveScience

   --------------------------------------------------------------------------------

 * FEATURED
   Ukraine crisis – Digital security resource
   centerWeLiveProgressCOVID-19ResourcesVideos

   --------------------------------------------------------------------------------

 * TOPICS
   Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet
   of ThingsMalwareRansomwareSecure codingMobile securityCritical
   infrastructureThreat research

   --------------------------------------------------------------------------------

 * ABOUT US
   About WeLiveSecurityOur ExpertsContact Us

   --------------------------------------------------------------------------------

 * English
   EspañolDeutschPortuguêsFrançais
 * 



Award-winning news, views, and insight from the ESET security community

Privacy

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system



Digital Security

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your
organization



Digital Security

Black Hat Europe 2024: Can AI systems be socially engineered?



Next

Business Security

Untangling the hiring dilemma: How security solutions free up HR processes

Business Security

MDR: Unlocking the power of enterprise-grade security for businesses of all
sizes


LATEST ARTICLES

Privacy

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system



Privacy

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Our ‘computers on wheels’ are more connected than ever, but the features that
enhance our convenience often come with privacy risks in tow

Tony Anscombe • 13 Dec 2024

--------------------------------------------------------------------------------

Digital Security

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your
organization



Digital Security

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your
organization

Aggregate vulnerability scores don’t tell the whole story – the relationship
between a flaw’s public severity rating and the specific risks it poses for your
company is more complex than it seems

Tony Anscombe • 13 Dec 2024

--------------------------------------------------------------------------------

Digital Security

Black Hat Europe 2024: Can AI systems be socially engineered?



Digital Security

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and
even make it their unwitting ally?

Tony Anscombe • 12 Dec 2024

--------------------------------------------------------------------------------

Video, Business Security

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)



Video, Business Security

How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8)

As cybersecurity is a make-or-break proposition for businesses of all sizes, can
your organization's security strategy keep pace with today’s rapidly evolving
threats?

Editor • 10 Dec 2024

--------------------------------------------------------------------------------

Mobile Security

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid
security risks



Mobile Security

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid
security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take
these steps to enjoy the benefits of cutting-edge technology at a fraction of
the cost

Phil Muncaster • 09 Dec 2024

--------------------------------------------------------------------------------

We Live Science

Philip Torr: AI to the people | Starmus Highlights



We Live Science

Philip Torr: AI to the people | Starmus Highlights

We’re on the cusp of a technological revolution that is poised to transform our
lives – and we hold the power to shape its impact

Editor • 05 Dec 2024

--------------------------------------------------------------------------------

Business Security

Achieving cybersecurity compliance in 5 steps



Business Security

Achieving cybersecurity compliance in 5 steps

Cybersecurity compliance may feel overwhelming, but a few clear steps can make
it manageable and ensure your business stays on the right side of regulatory
requirements

Márk Szabó • 03 Dec 2024

--------------------------------------------------------------------------------

We Live Science

Richard Marko: Rethinking cybersecurity in the age of global challenges |
Starmus Highlights



We Live Science

Richard Marko: Rethinking cybersecurity in the age of global challenges |
Starmus Highlights

ESET's CEO unpacks the complexities of cybersecurity in today’s hyper-connected
world and highlights the power of innovation in stopping digital threats in
their tracks

Editor • 02 Dec 2024

--------------------------------------------------------------------------------

Video

Month in security with Tony Anscombe – November 2024 edition



Video

Month in security with Tony Anscombe – November 2024 edition

Zero days under attack, a new advisory from 'Five Eyes', thousands of ICS units
left exposed, and mandatory MFA for all – it's a wrap on another month filled
with impactful cybersecurity news

Editor • 29 Nov 2024

--------------------------------------------------------------------------------

Scams

Scams to look out for this holiday season



Scams

Scams to look out for this holiday season

‘Tis the season to be wary – be on your guard and don’t let fraud ruin your
shopping spree

Phil Muncaster • 28 Nov 2024

--------------------------------------------------------------------------------

Video

Bootkitty marks a new chapter in the evolution of UEFI threats



Video

Bootkitty marks a new chapter in the evolution of UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat
landscape and underscores the need for vigilance against future threats

Editor • 27 Nov 2024

--------------------------------------------------------------------------------

ESET Research

Bootkitty: Analyzing the first UEFI bootkit for Linux



ESET Research

Bootkitty: Analyzing the first UEFI bootkit for Linux

ESET researchers analyze the first UEFI bootkit designed for Linux systems

Martin Smolár and Peter Strýček • 27 Nov 2024

 * <
 * 1
 * ...
 * 2
 * 3
 * 4
 * ...
 * 544
 * >

--------------------------------------------------------------------------------


LET US KEEP YOU
UP TO DATE

Sign up for our newsletters

Ukraine Crisis newsletterRegular weekly newsletterSubscribe


FOLLOW US



Award-winning news, views, and insight from the ESET security community

About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS
Feed

Copyright © ESET, All Rights Reserved
Your account, your cookies choice
We and our partners use cookies to give you the best optimized online
experience, analyze our website traffic, and serve you with personalized ads.
You can agree to the collection of all cookies by clicking "Accept all and
close" or adjust your cookie settings by clicking "Manage cookies". You also
have the right to withdraw your consent to cookies anytime. For more
information, please see our Cookie Policy.
Accept all and close
Manage cookies
Essential cookies
These first-party cookies are necessary for the functioning and security of our
website and the services you require. They are usually set in response to your
actions to enable the use of certain functionality, such as remembering your
cookie preferences, logging in, or holding items in your cart. You can´t opt out
of these cookies, and blocking them via a browser may affect site functionality.
Basic Analytical Cookies
These first-party cookies enable us to measure the number of visitors/users of
our website and create aggregated usage and performance statistics with the help
of our trusted partners. We use them to get the basic insight into our website
traffic and our campaign performance and to solve bugs on our website.
Advanced Analytical Cookies
These first or third-party cookies help us understand how you interact with our
website and each offered service by enriching our datasets with data from
third-party tools. We use these cookies to improve our website, services, and
user experience, find and solve bugs or other problems with them, and evaluate
our campaigns´ effectiveness.
Marketing cookies
These third-party cookies allow our marketing partners to track some of your
activities on our website (for example, when you download or buy our product) to
learn about your interests and needs and to show you more relevant targeted ads.
Accept and close
Back