WhatsApp Rolls Out Lockdown-Style “Strict Account Settings” to Protect High-Risk Users

Related

CISOs and Security Leaders to Watch in Australian Media and Entertainment

Cybersecurity in media and entertainment has quietly become one...

Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

What happened A security vulnerability in the Moltbook AI agent...

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing Data

What happened Socket researchers uncovered multiple malicious Chrome extensions that...

NationStates Confirms Data Breach and Temporarily Shuts Down Game Site

What happened NationStates confirmed a data breach after unauthorized remote...

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

What happened A cyber espionage campaign attributed to an Iran-linked...

Share

What happened

Meta’s WhatsApp has launched a new high-security option called Strict Account Settings, a lockdown-style security mode that applies the most restrictive privacy and protection controls to accounts at risk of targeted spyware and cyberattacks.

Who is affected

While available to all users, this mode is primarily intended for journalists, public-facing figures, activists, and other high-risk individuals who may be targeted by sophisticated threat actors.

Why CISOs should care

Messaging platforms like WhatsApp are pervasive in corporate and personal communication, but they are also exploited vectors for spyware, zero-click attacks, and social engineering. Enhanced security modes that trade usability for stronger defenses are an important tool in a layered protection strategy, particularly for high-value targets and executives whose compromise could yield broader organizational impact. 

3 practical actions

  1. Evaluate risk profiles for executives and high-visibility employees to determine who should enable WhatsApp’s Strict Account Settings.
  2. Update messaging security policies to include guidance on enabling enhanced platform features and phishing awareness.
  3. Monitor threat intelligence for evolving attack techniques against mobile messaging platforms and adjust defensive measures accordingly.