Given the reliance of today’s digital world on APIs and the fact that attacks targeting them continue...
We Live Security RSS Feed
We Live Security RSS Feed
As APIs are a favorite target for threat actors, the challenge of securing the glue that holds...
A roundup of some of the handiest tools for the collection and analysis of publicly available data...
A peek under the hood of a cybercrime operation and what you can do to avoid being...
ESET research uncovers an Android app that initially had no harmful features but months later turned into...
ESET researchers reveal details about a prevalent cryptor, operating as a cryptor-as-a-service used by tens of malware...
Nobody wants to spend their time dealing with the fallout of a security incident instead of building...
Android app breaking bad: From legitimate screen recording to file exfiltration within a year
1 min read
ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and...
Don’t download software from non-reputable websites and sketchy links – you might be in for more than...
A roundup of some of the handiest tools that security professionals can use to search for and...