Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trojanized OneNote Document Leads to Formbook Malware

Cybercriminals have long used Microsoft documents to pass along malware and they are always experimenting with new ways to deliver malicious packages. As defenders, Trustwave SpiderLabs’ researchers are always looking out for new or unusual file types, and through this ongoing research, we uncovered threat actors using a OneNote document to move Formbook malware, an information stealing trojan sold on an underground hacking forum since mid-2016 as malware-as-a-service.

Going Mobile: BEC Attacks Are Moving Beyond Email

Recently, we’ve noticed an increase in user reports of SMS-based Business Email Compromise (BEC) messages. This seems to be part of a wider trend as phishing scams via text messages surge. The Federal Communications Commission (FCC) observed an increase in unsolicited text messages, with 2022 practically tripling the number of phishing texts reported to the FCC in 2019. Phishing scams are prevalent in the SMS threat landscape, and now, BEC attacks are also going mobile.

Six Ways to Level Up Your Security Tech Stack

Security technology is all but ubiquitous. No matter the industry or size, almost every organization employs security technology to keep their systems, assets, and data safe. But, if your industry is retail or healthcare — or you’re a small shop that sells bagels on the town square — your organization may not have the best grip on what your security stack should contain, or if your current one is meeting your security and business needs.

2022 in Review: 4 Lessons We've Learned from 2022's Largest GitHub Breaches

2022 revealed that security challenges remain for organizations leveraging GitHub. Between supply chain attacks, API key leaks, and other security risks, there are plenty of lessons and takeaways from this year’s GitHub-related headlines. In this post, we’ve rounded up and categorized the year’s largest GitHub stories. Read on to learn more about the types of security risks occurring in GitHub and the lessons you’ll want to take with you into 2023 and beyond.

3 cybersecurity strategies for healthcare leaders in a digital-first world

From on-demand healthcare services like telehealth to wearable technologies, predictive healthcare to blockchain technologies for electronic health records, or 5G for healthcare services to AI and augmented reality for state-of-the-art medical treatments, the healthcare industry is at an inflection point. These digital transformations also bring along elevated cybersecurity risks.

How and Why LimaCharlie Secures Google Chrome and ChromeOS

Chrome is the world’s most popular web browser—and ChromeOS is becoming more prevalent due to the use of Chromebooks in education and other sectors. In this blog post, we’re going to talk about what this means for security teams, and how LimaCharlie can be used to secure Chrome and ChromeOS.

How to handle Node.js file uploads with Fastify

File uploading is a commonly needed functionality in web applications. Because of this, many web frameworks provide ways to allow server-side applications to accept files and work with them. This is the same with Fastify, which is a Node.js web framework that is often regarded as a successor to Express. It’s fast and highly focused on providing the best developer experience with a powerful plugin architecture and the least overhead possible.

Using Snyk reporting for data-driven security

Last month, we announced the open beta of Snyk’s new and revamped reporting. Since then, we’ve been amazed at how creative our customers have been in leveraging these new capabilities to answer all sorts of different security questions. We’re not surprised. The new reporting was designed to provide easy access to data across the Snyk platform (including Snyk Code!), and to give customers flexible analysis tools to slice and dice data as they see fit.

A Useful Cybersecurity Guide Made Specifically for Small Businesses

Starting a small business can be a challenging task. You become responsible for many things simultaneously, such as handling different business operations, establishing partnerships with others, paying salaries and taxes, and trying to profit from your products or services. The last thing you want to occur is a cyberattack on your business. Some people believe that cyberattacks aren’t a huge threat to small businesses.

Modern Enterprises Require End-to-End Visibility

If you have a single vendor, single cloud homogenous network where everything is documented, you know where every device is, and you know all the possible paths in your network, then you are a networking deity. Realistically, nobody has a “simple” and fully documented network. Mainly because enterprises grew over time with the organization.