|
By Karl Biron
In the world of malware, common ransomware schemes aim to take the data within databases (considered the "gold" in the vault of any organization) and hold them hostage, promising data recovery upon ransom payment. Typically, most of these schemes follow an expected script: encrypting files, requesting payment, and then delivering a decryption key. This model, while damaging, generally allows victims to recover if they pay the ransom.
|
By Trustwave
The Digital Operational Resilience Act (DORA) is poised to reshape the European financial landscape, demanding a robust defense against cyber threats and operational disruptions and Trustwave is putting the pedal to the metal to prepare clients with our DORA Readiness Accelerator service. The Trustwave DORA Readiness Accelerator, which joins Trustwave’s CMMC readiness and Microsoft Security accelerators, provides a structured approach to achieving compliance and bolstering operational resilience.
|
By Trustwave
In late November and December 2024, Arctic Wolf observed evidence of a mass compromise of Fortinet FortiGate. While the initial attack vector was unknown at the time, evidence of compromise (with new users and SSL profiles) was consistent across compromised devices. On January 14, Fortinet released a formal statement and patch. The vulnerability is an Authentication Bypass via crafted requests to Node.js websocket module and issued CVE-2024-55591. The CVSSv3 score is 9.6.
|
By Grayson Lenik
Organizations today face a rapidly evolving threat landscape, and as they plan their cybersecurity strategy and budgets, many may struggle with a key question: If I’m conducting regular vulnerability scans, and patching the vulnerabilities I identify, do I really need penetration tests as well? The answer is yes. While vulnerability scanning plays a vital role in identifying risks and vulnerabilities, relying solely on it for security creates blind spots.
|
By Rodel Mendrez
Trustwave SpiderLabs first blogged about Magecart back in 2019; fast forward five years and it is still here going strong. During the pre-holiday season, cybercriminals ramped up their efforts to target e-commerce websites, aiming to steal cardholder and personal information. These attacks, collectively known as Magecart, have been active since 2015, named after the Magento e-commerce platform with "cart" referencing shopping carts — their initial primary targets.
|
By Craig Searle
As 2024 has wrapped up, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. I'm willing to go on a limb this year and say there is an excellent chance we will see the first fully autonomous and end-to-end malware, ransomware, or other cyberattack campaigns take place.
|
By Trustwave
The Health and Human Services Office of Civil Rights (OCR) has launched an effort to improve cybersecurity measures for a wide variety of healthcare organizations. The aim is to counter the significant increase in the number of breaches and cyberattacks impacting healthcare along with the common deficiencies OCR has observed in its investigations into Security Rule compliance, cybersecurity guidelines, best practices, methodologies, procedures, and processes.
|
By Allen Numerick
As companies continue to integrate their operational technology (OT) and IT environments, they’re coming to grips with the fact that this move opens them up to new avenues for cyber threats. The solution is multi-faceted, but one aspect is clear: combining OT and IT requires extending offensive security measures, such as penetration testing, to the OT environment.
|
By Trustwave
As always in cybersecurity, hardly a dull day went by in 2024. So much happened we thought it might be helpful to remind everyone what went down over the last 12 months. At least from a Trustwave SpiderLabs perspective. Here are the top SpiderLabs’ blogs, as voted by viewer readership analytics: Trustwave SpiderLabs would like to thank all its readers and we hope we informed, inspired and maybe made you laugh a few times in 2024. See you all next week in 2025.
|
By Darren Van Booven
As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Here is the latest installment.
|
By Trustwave
How do you know that your organization is not breached at this very moment? Many threats are designed to lurk in the shadows, going undetected before causing damage and extracting confidential data from unassuming organizations. And a traditional threat hunt searching for known Indicators of Compromise (IoCs) doesn’t always detect the threats designed to evade.
|
By Trustwave
An exclusive look inside Trustwave Spiderlabs, where our commitment to excellence in financial and technical services shines through every test we conduct. Join Damian Archer, Vice President of Trustwave Spiderlabs, as he unveils the secrets to substantial cost savings while maintaining the highest quality standards.
|
By Trustwave
Don’t let complexity and cyber threats get in the way of moving your business forward. Trustwave Managed Detection and Response (MDR) is an industry-leading rapid threat detection and response service. We monitor, investigate, and respond to active threats to your business 24x7. Augment your team today with cyber experts for superior protection against the most sophisticated threats.
|
By Trustwave
Trustwave Managed Detection and Response services integrate with Microsoft Defender for Endpoint to take containment, eradication, and recovery actions directly on the endpoint, delivering a streamlined experience for the end users. For further information on how to truly integrate your cyber defense team with industry-leading services and technologies, watch our overview of how Trustwave partners with Microsoft.
|
By Trustwave
Scale your organization’s cyber defense program by harnessing the power of industry-leading Trustwave Managed Detection and Response services by leveraging industry-leading Microsoft Sentinel. In this brief video overview, we cover: View the video for further insight into the partnership of Trustwave and Microsoft.
|
By Trustwave
As organizations turn away from legacy branch routers in favor of secure SD-WAN solutions, Trustwave has the security solutions to help.
|
By Trustwave
In today’s threat environment, the reality is that most organizations will inevitably experience a breach. At Trustwave, our job is detecting, containing and eradicating those threats with Managed Threat Detection and Response (MTDR) services. Find out how we provide you with the security outcomes you need, so that you can stay focused on doing what you do best… keeping your organization running.
|
By Trustwave
For organizations that might be new to the world of managed security services (MSS), what is the process of getting started like? What are the main benefits that a client should expect to realize? And how does managed threat detection and response (MTDR) fit into the mix? To find out, we interviewed Rachelle Felix-Blackmon, Director of Global MSS Business Operations at Trustwave.
|
By Trustwave
How concerned should organizations be about the danger from nation state actors? To find out, we interviewed Brian Hussey, VP of Cyber Threat Detection & Response at Trustwave. Topics we covered included what he sees in the field when it comes to nation-state capabilities, whether or not they truly are better organized than cyber gangs, and how organizations can help protect themselves.
|
By Trustwave
We interviewed Liz Limjuco, SVP of U.S. Cyber Brokerage at Marsh, to talk about what risk trends she is seeing in cybersecurity, what organizations are doing to adapt to those trends, how organizations can better understand their risks, and what they can do to help mitigate those risks.
|
By Trustwave
In today's hyper-connected world, cyberattack risks have never been more pronounced. Threat actors continue to develop malicious, ingenious tricks and techniques to stay one step ahead of security systems and response specialists. As a result, a more focused and proactive approach to detecting, investigating, and responding to threats is required. In this guide, we break down the comparison between Managed Detection and Response (MDR) and Managed Security Services (MSS) and how to determine what to look for in providers.
|
By Trustwave
It is no secret that many organizations can do better with their security programs. Zero Trust allows for an evolution of an organization's strategy. It also forces organizations to rethink their approach to securing data to meet the requirements of data privacy regulations and expectations from their customers and business partners. Risk-minded organizations take the Zero Trust mindset and adopt it as best they can to fit their current and future state infrastructure.
|
By Trustwave
Cybercrime continues to rise, and Financial Services organizations are often a prime target due to their valuable data. While no strangers to maintaining strong security strategies, it can be exhausting staying one step ahead of the threats.
|
By Trustwave
Relational databases and big data stores are a prime target for attackers due to the amount of sensitive information residing within, such as customer information, intellectual property and proprietary secrets. For more than 20 years, the database security experts at Trustwave have helped organizations design, implement and maintain database security programs to meet their specific business, security and compliance objectives.
|
By Trustwave
Wondering what the underground world of cybercrime looks like following after a year of unprecedented events? Bad actors capitalize on these events - from political unrest and economic instability to changing workforce dynamics and ongoing public health concerns - putting organizations of all sizes and across all industries at increased risk. Learning more about these new and innovative exploits, which take advantage of unprecedented global circumstances, allows you to make more informed decisions regarding your security posture.
|
By Trustwave
Government agencies are faced with the complexity of what needs to be done to meet the Executive Order 14028 requirements. This whitepaper provides guidance on how to comply with the Executive Order and how it applies to securing critical databases.
|
By Trustwave
The ever-shifting threat landscape coupled with the increased risk and loss of confidential information through previous breaches, defending protected controlled unclassified information within the DIB supply chain is increasingly difficult. The Department of Defense (DoD) determined that its supply chain faced an unacceptable amount of risk, resulting in the transition from self-certification to the creation of the CMMC (Cybersecurity Maturity Model Certification), which requires third-party assessments and certification of compliance.
|
By Trustwave
If your organization is using or plans to move to Microsoft 365, learn what to expect from an email security, data protection and management perspective. Read our latest whitepaper In, Out and Around: 360° Security for Microsoft 365 for insights into protecting Microsoft 365 email in these key areas.
- January 2025 (8)
- December 2024 (18)
- November 2024 (20)
- October 2024 (21)
- September 2024 (22)
- August 2024 (21)
- July 2024 (25)
- June 2024 (24)
- May 2024 (19)
- April 2024 (28)
- March 2024 (25)
- February 2024 (15)
- January 2024 (20)
- December 2023 (12)
- November 2023 (13)
- October 2023 (16)
- September 2023 (17)
- August 2023 (25)
- July 2023 (15)
- June 2023 (20)
- May 2023 (17)
- April 2023 (17)
- March 2023 (17)
- February 2023 (12)
- January 2023 (8)
- December 2022 (15)
- November 2022 (14)
- October 2022 (13)
- September 2022 (9)
- August 2022 (13)
- July 2022 (9)
- June 2022 (14)
- May 2022 (12)
- April 2022 (8)
- March 2022 (14)
- February 2022 (11)
- January 2022 (15)
- December 2021 (14)
- November 2021 (8)
- October 2021 (5)
- September 2021 (2)
- August 2021 (2)
- July 2021 (2)
- January 2021 (1)
- October 2020 (1)
- July 2020 (5)
- June 2020 (2)
- May 2020 (3)
Trustwave is recognized as a global security leader in managed security services (MSS) and managed detection and response (MDR). With more than 2,000 world-class security professionals operating on behalf of clients across 96 countries, Trustwave helps organizations across the globe detect and respond to threats 24x7 in the hybrid multi-cloud world.
The elite Trustwave SpiderLabs team provides award-winning threat research and intelligence, which is infused into Trustwave services and products to fortify cyber resilience in the age of advanced threats.
Recognized as a Leader in Stopping Threats:
- Detection and Response: Helping clients design and advance their cyberthreat operations , adding 24x7 monitoring capacity, threat hunting and rapid response.
- Threat Protection: Services and solutions to help organizations protect data, assets and users.
- Continuous Testing: Helping clients reduce risks in their ever-evolving attack surface to better discover, manage and remediate vulnerabilities.
Cyber resilience for the hybrid, multi-cloud world.