Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Do Cybercriminals Spread Malware?

Cybercriminals can spread malware through phishing attacks, man-in-the-middle attacks, exploit kits and drive-by downloads. Cybercriminals typically use social engineering tactics to trick people into downloading malware or exploit security vulnerabilities to install malware without the victim knowing. Continue reading to learn more about malware, how cybercriminals spread it, how to detect if your device is infected and how to stay protected against malware.

Trustwave MailMarshal Now Available on the Microsoft Azure Marketplace

Trustwave MailMarshal is now listed on the Microsoft Azure Marketplace, an online store for solutions that are built on or built for Azure and intended for IT professionals and developers. Trustwave MailMarshal joins an illustrious list of IT software applications and services built by industry-leading technology companies.

From Confusion to Clarity: Red Sift Breaks Down Google and Yahoo's Email Security Requirements

Many people around the world right now are confused as to whether their organization is ready for Google and Yahoo’s new requirements for bulk senders. So don’t worry, you’re not alone. Back in October the announcement was made that there would be consequences for organizations sending more than 5,000 emails a day who didn’t have their email security in order. But what are the consequences? And who really needs to worry?

Decoding Cyber Security Innovations with SecurityScorecard CEO Alex Yampolskiy

As part of a multi-part series with NightDragon, Nasdaq, and J.P. Morgan, SecurityScorecard founder and CEO Dr. Aleksandr Yampolskiy sat down with NightDragon CEO Dave DeWalt and unveiled his deep-rooted passion for cybersecurity. Tracing back to an early encounter with a computer virus as a child, Yampolskiy discusses how this pivotal moment sparked an enduring curiosity, driving him toward a distinguished academic path.

End-to-End Encryption - What it is and How It Works

In an advanced interconnected world, the internet is essential in facilitating a significant portion of communications, making security a paramount concern. Whether you pick up a newspaper or follow a news link, you will see reviews of some other protection breach or hacking try. Despite the inherent risks associated with online communication and data exchange, the speed and convenience of technology make it a worthwhile endeavour. However, there is a strategy to address these concerns.

Navigating the complex world of zero trust security

These days, data breaches are as common as morning coffee — but far more bitter. According to Sophos’ State of Ransomware 2023 report, 66% of respondents revealed their organization was hit by ransomware in the last year. SonicWall’s mid-year update to its latest Cyber Threat Report found that internet of things (IoT) malware is up 37% globally from 2021, there’s been a 399% surge in cryptojacking, and encrypted threat attacks have jumped 22% globally.

Cloud penetration testing challenges and techniques

In recent years, cloud computing has become a pivotal element in modern business structure, fundamentally altering how you manage, process and safeguard your data. Its growth isn’t just a trend; it represents a shift in the digital paradigm, offering scalability, efficiency and innovative solutions to complex business needs. But with these advances come new challenges in cybersecurity, particularly in cloud environments.

Quality > Quantity: How to Get the Most Out of SAST

Static Application Security Testing (SAST) has a bit of a bad reputation. SAST tools can produce an overwhelming number of alerts and security teams, having often come from networking backgrounds, don’t always fully understand the alerts that they are passing on to developers for fixes. This can cause the relationships between the teams to sour, as developers often perceive this work as pointless and holding them back from working on their primary responsibilities like new features.