Trustwave
Cybercriminals are becoming more methodical and adaptive
Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations …
Trustwave delivers managed support for key Palo Alto Networks offerings
Trustwave announced an expanded alliance with Palo Alto Networks for delivering managed security services to businesses and institutions worldwide. Trustwave now offers …
Trustwave partners with Cybereason to strengthen MDR for Endpoints
Trustwave announced a strategic alliance with Cybereason to further strengthen Trustwave Managed Detection and Response (MDR) for Endpoints, a comprehensive managed security …
Trustwave unveils new advanced Secure Email Gateway for blended threats
Trustwave unveiled Trustwave Secure Email Gateway (SEG) 8.2, the latest iteration of its email security platform that offers organizations a solution for advanced email …
Conficker: A 10-year retrospective on a legendary worm
This November marked the 10-year anniversary of Conficker, a fast-spreading worm targeting Microsoft systems that went on to claim one of the highest levels of infection in …
Make-A-Wish website compromised to serve cryptojacking script
Visitors of the international website of the US-based non-profit Make-A-Wish Foundation have had their computing power misused to covertly mine cryptocurrency, Trustwave …
Five key considerations when developing a Security Operations Center
Ensuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of many organization’s security strategy today. …
Trustwave opens cybersecurity command center
Trustwave unveiled the Trustwave SpiderLabs Fusion Center, a cybersecurity command center that employs threat intelligence to track threat actors, detect them with their …
Social Mapper: A free tool for automated discovery of targets’ social media accounts
Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool …
Compromised MikroTik routers power extensive cryptojacking campaign
A massive cryptojacking campaign that relies on compromised MikroTik routers serves users with pages injected with the Coinhive mining script. It seems that the attacker …
Overview: Microsoft June 2018 Patch Tuesday
It’s that time of the month again when Microsoft releases patches for its software. The June 2018 updates fix 50 vulnerabilities, 12 of which are critical. The company …
Pressures impacting security pros are up, threats are turning up the heat
Trustwave released the 2018 Security Pressures Report based on a global survey of 1,600 full-time IT professionals who are security decision makers or security influencers …