Security Blog- 2026  2025  2024  2023  2022  2021  2020  2019  2018

AI blog  APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

DATE

NAME

Info

CATEG.

WEB

17.1.26 AuraInspector: Auditing Salesforce Aura for Data Exposure Mandiant is releasing AuraInspector, a new open-source tool designed to help defenders identify and audit access control misconfigurations within the Salesforce Aura framework. Security blog

Google Threat Intelligence

10.1.26 How Cisco Talos powers the solutions protecting your organization What happens under the hood of Cisco's security portfolio? Our reputation and detection services apply Talos' real-time intelligence to detect and block threats. Here's how. Security blog

CISCO TALOS

22.11.25 Today’s threat landscape demands a proactive OT security strategy OT is increasingly targeted by cybercriminals, making it essential for organizations to prioritize proactive OT security defense. Security blog Trelix
15.11.25 You Thought It Was Over? Authentication Coercion Keeps Evolving Imagine a scenario where malicious actors don’t need to trick you into giving up your password. They have no need to perform sophisticated social engineering attacks or exploit vulnerabilities in your operating system. Security blog Palo Alto
1.11.25 Silent Push 2026 Predictions The Silent Push Threat Intelligence team discussed what we see as some of the greatest threats and motivators the global community will encounter in the New Year. Here are our 2026 predictions: Security blog Silent Push
1.11.25 Keys to the Kingdom: A Defender's Guide to Privileged Account Monitoring Privileged access stands as the most critical pathway for adversaries seeking to compromise sensitive systems and data. Its protection is not only a best practice, it is a fundamental imperative for organizational resilience. Security blog Google Threat Intelligence
1.11.25 Cybersecurity Awareness Month 2025: When seeing isn't believing Deepfakes are blurring the line between real and fake and fraudsters are cashing in, using synthetic media for all manner of scams Security blog Eset
1.11.25 Recruitment red flags: Can you spot a spy posing as a job seeker?

Here’s what to know about a recent spin on an insider threat – fake North Korean IT workers infiltrating western firms

Security blog Eset
1.11.25 How MDR can give MSPs the edge in a competitive market With cybersecurity talent in short supply and threats evolving fast, managed detection and response is emerging as a strategic necessity for MSPs Security blog Eset
25.10.25 How Trend Micro Empowers the SOC with Agentic SIEM By delivering both XDR leadership and Agentic SIEM innovation under one platform, Trend is redefining what security operations can be. Security blog Trend Micro
13.9.25 International Guidance Promotes SBOM Adoption to Enhance Software Supply Chain Security New global SBOM guidance aims to boost software supply chain security, enhance transparency, and improve vulnerability and risk management across industries. Security blog Cyble
19.7.25 Securing Tomorrow: An Interview with Trend Micro VP of Product Management Michael Habibi Proactive security in a rapidly evolving threat landscape Security blog Trend Micro
19.7.25 CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how integrated security solutions can help organizations strengthen their cloud identity defenses and meet evolving federal standards. Security blog Trend Micro
12.7.25 Direct Memory and Container OOMKilled Errors Recently, we encountered continuous integration (CI) build failures in two of our microservices, caused by Java unit tests. Security blog PROOFPOINT
14.6.25 How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware In today’s hyper-connected digital world, the cybersecurity landscape is shifting dramatically. Gone are the days when cyberattacks primarily relied on human intervention. We’re now facing a new... Security blog Seqrite
7.6.25 Verizon DBIR 2025 Key Stats: Network Device Attacks, Third Party Risk, and More Massive shifts in cyber attack behavior have been revealed in the 2025 Verizon Data Breach Investigation Report (DBIR). Here are a few of the most surprising stats with real world implications for cybersecurity strategy and attack surface management. Security blog Eclypsium
24.5.24 Defining a new methodology for modeling and tracking compartmentalized threats How do you profile actors and defend your systems when multiple threat actors are working together? In Part 2, Cisco Talos proposes an extended Diamond Model to analyze complex relationships between attackers. Security blog CISCO TALOS
19.4.25 Revolutionizing Your SOC: Welcome to Threat Protection Workbench Email remains the number one threat vector in today’s cyber landscape, responsible for more than 90% of successful cyberattacks. As the volume and sophistication of email threats grow, security operations center (SOC) teams are under constant pressure to investigate and respond to incidents more quickly. Even with strong detection, the sheer number of alerts and investigation steps can slow down response times and strain already limited resources—leading to fatigue and increasing the risk of missed threats. Security blog PROOFPOINT

21.12.24

The evolution and abuse of proxy networks Proxy and anonymization networks have been dominating the headlines, this piece discusses its origins and evolution on the threat landscape with specific focus on state sponsored abuse. Security blog

Cisco Blog

2.11.24

Tony Fadell: Innovating to save our planet | Starmus highlights As methane emissions come under heightened global scrutiny, learn how a state-of-the-art satellite can pinpoint their sources and deliver the insights needed for targeted mitigation efforts Security blog

Eset

28.9.24

Secure Access Unlocked: Exploring WNM 4.5 and Service Provider Monthly Program Learn about exciting updates in WNM 4.5 plus new additions to our service provider program! Security blog SonicWall

14.9.24

The 2024 Threat Landscape State of Play Talos' Nick Biasini discusses the biggest shifts and trends in the threat landscape so far. We also focus on one state sponsored actor that has been particularly active this year, and talk about why defenders need to be paying closer attention to infostealers. Security blog

Cisco Blog

14.9.24

Watch our new documentary, "The Light We Keep: A Project PowerUp Story" The Light We Keep documentary tells the story of the consequences of electronic warfare in Ukraine and its effect on power grids across the country. Security blog

Cisco Blog

14.9.24

We can try to bridge the cybersecurity skills gap, but that doesn’t necessarily mean more jobs for defenders A June report from CyberSeek found that there are only enough skilled workers to fill 85 percent of cybersecurity jobs in America. Security blog

Cisco Blog

14.9.24

The best and worst ways to get users to improve their account security In my opinion, mandatory enrollment is best enrollment. Security blog

Cisco Blog

17.8.24

The great location leak: Privacy risks in dating apps What if your favorite dating, social media or gaming app revealed your exact coordinates to someone you’d rather keep at a distance? Security blog

Eset

27.7.24

Something Phishy This Way Comes: How the SonicWall SOC Proactively Defended Partners Against a New Attack

Proactive Protection: How SonicWall's security operations center (SOC) safeguards MSPs around the clock.

Security blog

SonicWall

27.7.24

How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe

A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats

Security blog

Eset

27.7.24

Beyond the blue screen of death: Why software updates matter

The widespread IT outages triggered by a faulty CrowdStrike update have put software updates in the spotlight. Here’s why you shouldn’t dread them.

Security blog

Eset

27.7.24

The complexities of cybersecurity update processes

If a software update process fails, it can lead to catastrophic consequences, as seen today with widespread blue screens of death blamed on a bad update by CrowdStrike

Security blog

Eset

20.7.24

Hello, is it me you’re looking for? How scammers get your phone number Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters. Security blog Eset

6.7.24

Not If, But When: The Need for a SOC and Introducing the SonicWall European SOC When you think about cyber threats or attacks, what comes to mind? It’s easy to associate cyberattacks with large enterprises since those are the attacks that frequently make the news. Security blog SonicWall

6.7.24

Key trends shaping the threat landscape in H1 2024 – Week in security with Tony Anscombe Learn about the types of threats that 'topped the charts' and the kinds of techniques that bad actors leveraged most commonly in the first half of this year Security blog Eset
29.6.24 How are attackers trying to bypass MFA? Exploring trends on how attackers are trying to manipulate and bypass MFA, as well as when/how attackers will try their 'push-spray' MFA attacks Security blog Cisco Blog
15.6.24 Microsoft Incident Response tips for managing a mass password reset When an active incident leaves systems vulnerable, a mass password reset may be the right tool to restore security. This post explores the necessity and risk associated with mass password resets. Security blog Microsoft Blog
15.6.24 How to achieve cloud-native endpoint management with Microsoft Intune  In this post, we’re focusing on what it really takes for organizations to become fully cloud-native in endpoint management—from the strategic leadership to the tactical execution. Security blog Microsoft Blog
15.6.24 The four stages of creating a trust fabric with identity and network security  The trust fabric journey has four stages of maturity for organizations working to evaluate, improve, and evolve their identity and network access security posture. Security blog Microsoft Blog
15.6.24 SANS's 2024 Threat-Hunting Survey Review In its ninth year, the annual SANS Threat Hunting Survey delves into global organizational practices in threat hunting, shedding light on the challenges and adaptations in the landscape over the past year. Security blog Trend Micro
15.6.24 It's Time to Up-Level Your EDR Solution You may have EDR, but did you know you can add threat detection and response to improve a SecOps team’s efficiency and outcomes - read more. Security blog Trend Micro
15.6.24 The Lifecycle of a Threat: The Inner Workings of the Security Operations Center See how SonicWall’s SOC handles a threat from discovery all the way to resolution in this detailed blog. Security blog SonicWall
8.6.24 What happens when facial recognition gets it wrong – Week in security with Tony Anscombe A facial recognition system misidentifies a woman in London as a shoplifter, igniting fresh concerns over the technology's accuracy and reliability Security blog Eset

25.5.24

Untangling the hiring dilemma: How security solutions free up HR processes The prerequisites for becoming a security elite create a skills ceiling that is tough to break through – especially when it comes to hiring skilled EDR or XDR operators. How can businesses crack this conundrum? Security blog Eset

11.5.24

How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe We spoke to climate scientist Katharine Hayhoe about intersections between climate action, human psychology and spirituality, and how to channel anxiety about the state of our planet into meaningful action Security blog Eset

11.5.24

In it to win it! WeLiveSecurity shortlisted for European Security Blogger Awards We’re thrilled to announce that WeLiveSecurity has been named a finalist in the Corporates – Best Cybersecurity Vendor Blog category of the European Security Blogger Awards 2024 Security blog Eset

11.5.24

How to inspire the next generation of scientists | Unlocked 403: Cybersecurity podcast As Starmus Earth draws near, we caught up with Dr. Garik Israelian to celebrate the fusion of science and creativity and venture where imagination flourishes and groundbreaking ideas take flight Security blog Eset
4.5.24 MDR: Unlocking the power of enterprise-grade security for businesses of all sizes We spoke to Astronomy magazine editor-in-chief David Eicher about key challenges facing our planet, the importance of space exploration for humanity, and the possibility of life beyond Earth Security blog Eset
28.4.24 What makes Starmus unique? A Q&A with award-winning filmmaker Todd Miller The director of the Apollo 11 movie shares his views about the role of technology in addressing pressing global challenges, as well as why he became involved with Starmus Security blog Eset
28.4.24 The vision behind Starmus – A Q&A with the festival’s co-founder Garik Israelian Dr. Israelian talks about Starmus's vision and mission, the importance of inspiring and engaging audiences, and a sense of community within the Starmus universe Security blog Eset
28.4.24 Protecting yourself after a medical data breach – Week in security with Tony Anscombe What are the risks and consequences of having your health data exposed and what are the steps to take if it happens to you? Security blog Eset
20.4.24 The many faces of impersonation fraud: Spot an imposter before it’s too late What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be? Security blog Eset
20.4.24 The ABCs of how online ads can impact children’s well-being From promoting questionable content to posing security risks, inappropriate ads present multiple dangers for children. Here’s how to help them stay safe. Security blog Eset
13.4.24 Beyond fun and games: Exploring privacy risks in children’s apps Should children’s apps come with ‘warning labels’? Here's how to make sure your children's digital playgrounds are safe places to play and learn. Security blog Eset
6.4.24 The devil is in the fine print – Week in security with Tony Anscombe Temu's cash giveaway where people were asked to hand over vast amounts of their personal data to the platform puts the spotlight on the data-slurping practices of online services today Security blog Eset
6.4.24 How often should you change your passwords? Answering this question is not as straightforward as it seems. Here’s what you should consider when it comes to keeping your accounts safe. Security blog Eset
31.3.24 RDP remains a security concern – Week in security with Tony Anscombe Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves at risk and get hit by data breaches as a result Security blog Eset
17.3.24 How to share sensitive files securely online Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains safe Security blog Eset
9.3.24 Irresistible: Hooks, habits and why you can’t put down your phone Struggle to part ways with your tech? You’re not alone. Here’s why your devices are your vices. Security blog Eset
2.3.24 Wireshark Tutorial: Exporting Objects From a Pcap Palo Alto Networks customers are better protected from the malware samples in this tutorial through Cortex XDR and XSIAM. Security blog Palo Alto
2.3.24 Blue Team toolkit: 6 open-source tools to assess and enhance corporate defenses Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor Security blog Eset
25.2.24 Everything you need to know about IP grabbers You would never give your personal ID to random strangers, right? So why provide the ID of your computer? Unsuspecting users beware, IP grabbers do not ask for your permission. Security blog Eset
25.2.24 Watching out for the fakes: How to spot online disinformation Why and how are we subjected to so much disinformation nowadays, and is there a way to spot the fakes? Security blog Eset
18.2.24 The art of digital sleuthing: How digital forensics unlocks the truth Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell Security blog Eset
10.2.24 The buck stops here: Why the stakes are high for CISOs Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses? Security blog Eset
10.2.24 Left to their own devices: Security for employees using personal devices for work As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it Security blog Eset
10.2.24 Could your Valentine be a scammer? How to avoid getting caught in a bad romance With Valentine’s Day almost upon us, here’s some timely advice on how to prevent scammers from stealing more than your heart Security blog Eset

20.1.24

Why many CISOs consider quitting – Week in security with Tony Anscombe The job of a CISO is becoming increasingly stressful as cybersecurity chiefs face overwhelming workloads and growing concerns over personal liability for security failings Security blog Eset

20.1.24

The 7 deadly cloud security sins and how SMBs can do things better By eliminating these mistakes and blind spots, your organization can take massive strides towards optimizing its use of cloud without exposing itself to cyber-risk Security blog Eset

14.1.24

A peek behind the curtain: How are sock puppet accounts used in OSINT? How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks Security blog Eset

14.1.24

Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe What are some of the key cybersecurity trends that people and organizations should have on their radars this year? Security blog Eset

14.1.24

Lost and found: How to locate your missing devices and more Losing your keys, your wallet – or anything else, really – can be a pain, but there is a wide world of trackers that can help you locate your missing things – with awesome accuracy Security blog Eset

14.1.24

Say what you will? Your favorite speech-to-text app may be a privacy risk Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets. Security blog Eset