Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks

C-level executives, diplomats, and high-ranking IT managers usually have access to sensitive information, huge amounts of data, finances, or a combination of all these things. And adversaries know it. Anticipating all the precious data and access rights, cybercriminals and state-sponsored advanced persistent threat groups (APTs) are willing to invest a lot of time and money … More Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks

ESET wins Best Cybersecurity Vendor Blog award!

The award is an excellent opportunity for us to thank our readers and to recognise the depth of talent of ESET’s security researchers and writers. Drumroll, please! The winners of the 2024 European Cybersecurity Blogger Awards have been chosen, and we couldn’t be prouder – WeLiveSecurity has been named the Best Cybersecurity Vendor Blog! The awards were presented … More ESET wins Best Cybersecurity Vendor Blog award!

TikTok Zero Day Hack Is Taking Over Celebrity and Brand Accounts

Recently, malicious code has infiltrated TikTok, compromising the official accounts of celebrities and brands. Notable victims allegedly include CNN, Paris Hilton, and Sony According to Forbes* the attack spreads via direct messages (DMs) within the TikTok app, without requiring any user interaction beyond opening the message. Although the affected accounts don’t seem to be posting … More TikTok Zero Day Hack Is Taking Over Celebrity and Brand Accounts

The job hunter’s guide: Separating genuine offers from scams

$90,000/year, full home office, and 30 days of paid leave, and all for a job as a junior data analyst – unbelievable, right? This and many other job offers are fake though – made just to ensnare unsuspecting victims into giving up their data. Seeking a job these days can be quite difficult, with many … More The job hunter’s guide: Separating genuine offers from scams