We Live Secruity
- The calm before the ransom: What you see is not all there is April 24, 2026A breach claims the systems as well as the confidence that was, in retrospect, a major vulnerability
- GopherWhisper: A burrow full of malware April 23, 2026ESET Research has discovered a new China-aligned APT group that we’ve named GopherWhisper, which targets Mongolian governmental institutions
- New NGate variant hides in a trojanized NFC payment app April 21, 2026ESET researchers discover another iteration of NGate malware, this time possibly developed with the assistance of AI
- What the ransom note won’t say April 20, 2026An attack is what you see, but a business operation is what you’re up against
- That data breach alert might be a trap April 17, 2026Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
- Supply chain dependencies: Have you checked your blind spot? April 16, 2026Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?
- Recovery scammers hit you when you’re down: Here’s how to avoid a second strike April 10, 2026If you’ve been a victim of fraud, you’re likely already a lead on a ‘sucker list’ – and if you’re not careful, your ordeal may be about to get worse.
- As breakout time accelerates, prevention-first cybersecurity takes center stage April 7, 2026Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy.
- Digital assets after death: Managing risks to your loved one’s digital estate April 1, 2026Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay.
- This month in security with Tony Anscombe – March 2026 edition March 31, 2026The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan