Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks

C-level executives, diplomats, and high-ranking IT managers usually have access to sensitive information, huge amounts of data, finances, or a combination of all these things. And adversaries know it. Anticipating all the precious data and access rights, cybercriminals and state-sponsored advanced persistent threat groups (APTs) are willing to invest a lot of time and money … More Valuable targets attract advanced threat actors. How to defend against quiet and persistent attacks

ESET wins Best Cybersecurity Vendor Blog award!

The award is an excellent opportunity for us to thank our readers and to recognise the depth of talent of ESET’s security researchers and writers. Drumroll, please! The winners of the 2024 European Cybersecurity Blogger Awards have been chosen, and we couldn’t be prouder – WeLiveSecurity has been named the Best Cybersecurity Vendor Blog! The awards were presented … More ESET wins Best Cybersecurity Vendor Blog award!

Kaseya DattoCon Europe: How to secure MSP success brick by brick

Cybersecurity is no longer a product, but a partnership that is fruitful rather than exhausting.  Back in 2014, LEGO fans started noticing that some new reddish-brown bricks were brittle and more susceptible to breaking. The issue, known as “brittle brown,” was quite clear — even one faulty brick could spoil the whole impression of a … More Kaseya DattoCon Europe: How to secure MSP success brick by brick

The murky world of password leaks – and how to check if you’ve been hit

Password leaks are increasingly common and figuring out whether the keys to your own kingdom have been exposed might be tricky – unless you know where to look Recently, I came across a report detailing “the mother of all breaches” – or to be more exact, the leak of a vast compilation of data that was … More The murky world of password leaks – and how to check if you’ve been hit