ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs

The post Jumping the air gap: 15 years of nation‑state effort appeared first on WeLiveSecurity

The INTERPOL-led operation involved law enforcement from 20 countries and led to the seizure of millions of dollars in illicit gains

The post More than 1,000 arrested in global crackdown on online fraud appeared first on WeLiveSecurity

How scammers take advantage of supply chain shortages – Tips for safe online shopping this holiday season – Steps to take after receiving a data breach notice

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

‘Tis the season to avoid getting played by scammers hijacking Twitter accounts and promoting fake offers for PlayStation 5 consoles and other red-hot products

The post The triangle of holiday shopping: Scams, social media and supply chain woes appeared first on WeLiveSecurity

With the holiday shopping bonanza right around the corner, here’s how to make sure your online spending spree is hacker-free

The post Avoiding the shopping blues: How to shop online safely this holiday season appeared first on WeLiveSecurity

Threat actors have previously timed ransomware and other attacks to coincide with holidays and weekends

The post FBI, CISA urge organizations to be on guard for attacks during holidays appeared first on WeLiveSecurity

Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed

The post What to do if you receive a data breach notice appeared first on WeLiveSecurity

ESET discovers watering hole attacks in the Middle East – Getting your life back on track after identity theft – How foreign influence operations have evolved

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity

Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks.

The post CYBERWARCON – Foreign influence operations grow up appeared first on WeLiveSecurity

US Government declassifies cybersecurity subjects they want you to learn about, and is hoping to pay you to learn them

The post US Government declassifies data to foster would‑be defenders appeared first on WeLiveSecurity