Virtual private networks: 5 common questions about VPNs answered
(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity
Industroyer: A cyber‑weapon that brought down a power grid
Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids The post Industroyer: A cyber‑weapon that brought down a power grid appeared first on WeLiveSecurity
100 days of war in Ukraine: How the conflict is playing out in cyberspace
It’s been 100 days since Russia invaded Ukraine, and we look back at various cyberattacks connected to the conflict The post 100 days of war in Ukraine: How the conflict is playing out in cyberspace appeared first on WeLiveSecurity
Keeping it real: Don’t fall for lies about the war
Falsehoods about the war in Ukraine come in all shapes and sizes – here are a few examples of what’s in the fake news The post Keeping it real: Don’t fall for lies about the war appeared first on WeLiveSecurity
Cybersecurity: A global problem that requires a global answer
New and exacerbated cyber-risks following Russia’s invasion of Ukraine are fueling a new urgency towards enhancing resilience The post Cybersecurity: A global problem that requires a global answer appeared first on WeLiveSecurity
Sandworm uses a new version of ArguePatch to attack targets in Ukraine
ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks The post Sandworm uses a new version of ArguePatch to attack targets in Ukraine appeared first on WeLiveSecurity
Fake news – why do people believe it?
In the age of the perpetual news cycle and digital media, the risks that stem from the fake news problem are all too real The post Fake news – why do people believe it? appeared first on WeLiveSecurity
Critical infrastructure: Under cyberattack for longer than you might think
Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services The post Critical infrastructure: Under cyberattack for longer than you might think appeared first on WeLiveSecurity
Industroyer2: Industroyer reloaded
This ICS-capable malware targets a Ukrainian energy company The post Industroyer2: Industroyer reloaded appeared first on WeLiveSecurity
How secure is your cloud storage? Mitigating data security risks in the cloud
As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice The post How secure is your cloud storage? Mitigating data security risks in the cloud appeared first on WeLiveSecurity