DATE | NAME | Info | CATEG. | WEB |
21.12.24 | The evolution and abuse of proxy networks | Proxy and anonymization networks have been dominating the headlines, this piece discusses its origins and evolution on the threat landscape with specific focus on state sponsored abuse. | Security blog | Cisco Blog |
2.11.24 | Tony Fadell: Innovating to save our planet | Starmus highlights | As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts | Security blog | Eset |
28.9.24 | Secure Access Unlocked: Exploring WNM 4.5 and Service Provider Monthly Program | Learn about exciting updates in WNM 4.5 plus new additions to our service provider program! | Security blog | SonicWall |
14.9.24 | The 2024 Threat Landscape State of Play | Talos' Nick Biasini discusses the biggest shifts and trends in the threat landscape so far. We also focus on one state sponsored actor that has been particularly active this year, and talk about why defenders need to be paying closer attention to infostealers. | Security blog | Cisco Blog |
14.9.24 | Watch our new documentary, "The Light We Keep: A Project PowerUp Story" | The Light We Keep documentary tells the story of the consequences of electronic warfare in Ukraine and its effect on power grids across the country. | Security blog | Cisco Blog |
14.9.24 | We can try to bridge the cybersecurity skills gap, but that doesn’t necessarily mean more jobs for defenders | A June report from CyberSeek found that there are only enough skilled workers to fill 85 percent of cybersecurity jobs in America. | Security blog | Cisco Blog |
14.9.24 | The best and worst ways to get users to improve their account security | In my opinion, mandatory enrollment is best enrollment. | Security blog | Cisco Blog |
17.8.24 | The great location leak: Privacy risks in dating apps | What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance? | Security blog | Eset |
27.7.24 | Something Phishy This Way Comes: How the SonicWall SOC Proactively Defended Partners Against a New Attack | Proactive Protection: How SonicWall's security operations center (SOC) safeguards MSPs around the clock. | Security blog | SonicWall |
27.7.24 | How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe | A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats | Security blog | Eset |
27.7.24 | Beyond the blue screen of death: Why software updates matter | The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them. | Security blog | Eset |
27.7.24 | The complexities of cybersecurity update processes | If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike | Security blog | Eset |
20.7.24 | Hello, is it me you’re looking for? How scammers get your phone number | Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters. | Security blog | Eset |
6.7.24 | Not If, But When: The Need for a SOC and Introducing the SonicWall European SOC | When you think about cyber threats or attacks, what comes to mind? It’s easy to associate cyberattacks with large enterprises since those are the attacks that frequently make the news. | Security blog | SonicWall |
6.7.24 | Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe | Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year | Security blog | Eset |
29.6.24 | How are attackers trying to bypass MFA? | Exploring trends on how attackers are trying to manipulate and bypass MFA, as well as when/how attackers will try their 'push-spray' MFA attacks | Security blog | Cisco Blog |
15.6.24 | Microsoft Incident Response tips for managing a mass password reset | When an active incident leaves systems vulnerable, a mass password reset may be the right tool to restore security. This post explores the necessity and risk associated with mass password resets. | Security blog | Microsoft Blog |
15.6.24 | How to achieve cloud-native endpoint management with Microsoft Intune | In this post, we’re focusing on what it really takes for organizations to become fully cloud-native in endpoint management—from the strategic leadership to the tactical execution. | Security blog | Microsoft Blog |
15.6.24 | The four stages of creating a trust fabric with identity and network security | The trust fabric journey has four stages of maturity for organizations working to evaluate, improve, and evolve their identity and network access security posture. | Security blog | Microsoft Blog |
15.6.24 | SANS's 2024 Threat-Hunting Survey Review | In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year. | Security blog | Trend Micro |
15.6.24 | It's Time to Up-Level Your EDR Solution | You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes - read more. | Security blog | Trend Micro |
15.6.24 | The Lifecycle of a Threat: The Inner Workings of the Security Operations Center | See how SonicWall’s SOC handles a threat from discovery all the way to resolution in this detailed blog. | Security blog | SonicWall |
8.6.24 | What happens when facial recognition gets it wrong – Week in security with Tony Anscombe | A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability | Security blog | Eset |
25.5.24 | Untangling the hiring dilemma: How security solutions free up HR processes | The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum? | Security blog | Eset |
11.5.24 | How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe | We spoke to climate scientist Katharine Hayhoe about intersections between climate action, human psychology and spirituality, and how to channel anxiety about the state of our planet into meaningful action | Security blog | Eset |
11.5.24 | In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards | We’re thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates – Best Cybersecurity Vendor Blog category of the European Security Blogger Awards 2024 | Security blog | Eset |
11.5.24 | How to inspire the next generation of scientists | Unlocked 403: Cybersecurity podcast | As Starmus Earth draws near, we caught up with Dr. Garik Israelian to celebrate the fusion of science and creativity and venture where imagination flourishes and groundbreaking ideas take flight | Security blog | Eset |
4.5.24 | MDR: Unlocking the power of enterprise-grade security for businesses of all sizes | We spoke to Astronomy magazine editor-in-chief David Eicher about key challenges facing our planet, the importance of space exploration for humanity, and the possibility of life beyond Earth | Security blog | Eset |
28.4.24 | What makes Starmus unique? A Q&A with award-winning filmmaker Todd Miller | The director of the Apollo 11 movie shares his views about the role of technology in addressing pressing global challenges, as well as why he became involved with Starmus | Security blog | Eset |
28.4.24 | The vision behind Starmus – A Q&A with the festival’s co-founder Garik Israelian | Dr. Israelian talks about Starmus's vision and mission, the importance of inspiring and engaging audiences, and a sense of community within the Starmus universe | Security blog | Eset |
28.4.24 | Protecting yourself after a medical data breach – Week in security with Tony Anscombe | What are the risks and consequences of having your health data exposed and what are the steps to take if it happens to you? | Security blog | Eset |
20.4.24 | The many faces of impersonation fraud: Spot an imposter before it’s too late | What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be? | Security blog | Eset |
20.4.24 | The ABCs of how online ads can impact children’s well-being | From promoting questionable content to posing security risks, inappropriate ads present multiple dangers for children. Here’s how to help them stay safe. | Security blog | Eset |
13.4.24 | Beyond fun and games: Exploring privacy risks in children’s apps | Should children’s apps come with ‘warning labels’? Here's how to make sure your children's digital playgrounds are safe places to play and learn. | Security blog | Eset |
6.4.24 | The devil is in the fine print – Week in security with Tony Anscombe | Temu's cash giveaway where people were asked to hand over vast amounts of their personal data to the platform puts the spotlight on the data-slurping practices of online services today | Security blog | Eset |
6.4.24 | How often should you change your passwords? | Answering this question is not as straightforward as it seems. Here’s what you should consider when it comes to keeping your accounts safe. | Security blog | Eset |
31.3.24 | RDP remains a security concern – Week in security with Tony Anscombe | Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result | Security blog | Eset |
17.3.24 | How to share sensitive files securely online | Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe | Security blog | Eset |
9.3.24 | Irresistible: Hooks, habits and why you can’t put down your phone | Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices. | Security blog | Eset |
2.3.24 | Wireshark Tutorial: Exporting Objects From a Pcap | Palo Alto Networks customers are better protected from the malware samples in this tutorial through Cortex XDR and XSIAM. | Security blog | Palo Alto |
2.3.24 | Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses | Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor | Security blog | Eset |
25.2.24 | Everything you need to know about IP grabbers | You would never give your personal ID to random strangers, right? So why provide the ID of your computer? Unsuspecting users beware, IP grabbers do not ask for your permission. | Security blog | Eset |
25.2.24 | Watching out for the fakes: How to spot online disinformation | Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes? | Security blog | Eset |
18.2.24 | The art of digital sleuthing: How digital forensics unlocks the truth | Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell | Security blog | Eset |
10.2.24 | The buck stops here: Why the stakes are high for CISOs | Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses? | Security blog | Eset |
10.2.24 | Left to their own devices: Security for employees using personal devices for work | As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it | Security blog | Eset |
10.2.24 | Could your Valentine be a scammer? How to avoid getting caught in a bad romance | With Valentine’s Day almost upon us, here’s some timely advice on how to prevent scammers from stealing more than your heart | Security blog | Eset |
20.1.24 | Why many CISOs consider quitting – Week in security with Tony Anscombe | The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings | Security blog | Eset |
20.1.24 | The 7 deadly cloud security sins and how SMBs can do things better | By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk | Security blog | Eset |
14.1.24 | A peek behind the curtain: How are sock puppet accounts used in OSINT? | How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks | Security blog | Eset |
14.1.24 | Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe | What are some of the key cybersecurity trends that people and organizations should have on their radars this year? | Security blog | Eset |
14.1.24 | Lost and found: How to locate your missing devices and more | Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy | Security blog | Eset |
14.1.24 | Say what you will? Your favorite speech-to-text app may be a privacy risk | Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets. | Security blog | Eset |