Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Comprehensive Guide to Software Penetration Testing

Why do companies spend millions of dollars on security measures only to have their systems compromised by hackers? The answer lies in the ever-evolving landscape of cyber threats and the need to improve security practices continuously. One of the most effective ways to stay ahead of these threats is through software penetration testing–a proactive approach to discovering and fixing vulnerabilities before they can be exploited.

From Transparency to Coercion, Emerging Threat Actor Tactics

“The evolving threat landscape” sounds like an overused clichè; however, marked shifts in threat actor tactics in the past year are evidence of widespread and brazen growth in confidence among threat actors. Evident in recent incidents, such as ALPHV, AKA Black Cat’s exploitation of legal avenues, and the emergence of “The Five Families” alliance, cybercriminals are stretching their levels of coordination and reach.

Digital Transformation in Banking: The Impact of Fintech Consulting

Banking is undergoing an evolution in the digital world. With the advent of fintech consulting, banks are updating their technology and reworking their business models to meet the demands of a new generation. This transformation has made it possible for banks to provide better customer experiences, while also increasing revenue streams. However, this drastic change from traditional banking processes has presented its own set of challenges for banks.

Efficiency Unleashed: Collaborative Solution Discovery by Artelogic

In the world of technology, there is great potential for innovation. While this can be a good thing, it can also cause confusion and uncertainty if the proper systems aren't in place. Collaborative Solution Discovery is one way to mitigate those issues and allow you to move forward with confidence in your implementation of new technologies.

New Kroll threat landscape report reveals sharp rise in social engineering

This rise in social engineering was seen alongside significant increases in phishing, smishing, vishing, the use of valid accounts and other tactics – adding up to the highest volume of incidents seen in 2023. These, as well as other notable trends from the previous quarter, are discussed in the report, Q3 2023 Threat Landscape Report: Social Engineering Takes Center Stage.

Can a passenger hack an airplane? Ethical hacker Ken Munro has the answer

Hollywood would have us believe that an airplane can be hacked by a tech-savvy passenger. But can they really? Ethical hacker Ken Munro decided to dig into airplane security and answer some common movie questions, like ‘what can a hacker do from seat 23A?’

Trustwave MailMarshal Email Security Protects Against WinRAR Vulnerability CVE-2023-38831

The importance of email security cannot be understated. Proof of this can be seen in some recent research conducted by the Trustwave SpiderLabs team around our email security product MailMarshal. The team recently ran an experiment on known Zero Day CVE-2023-38831 found in RARLabs WinRAR that is currently being exploited in the wild in WinRAR versions 6.23 and earlier. WinRAR is a compression, archiving, and archive managing software tool.

3 tips from our Internet Security Report on how to protect your network

More and more companies are realizing the importance of a unified cybersecurity system to shield against threats. Perhaps that's why cyberattacks on the network are becoming less common, dropping by almost 80% this quarter, according to our latest Internet Security Report (ISR). Even so, for SMBs, despite progress shown in adopting cybersecurity systems, the sheer volume of malware, as well as its rapid ability to change and evolve, poses a danger to company network systems.