A new report from Trustwave password-protected Zip files were the third most common format used by cybercriminals to conceal malware in the first half of this year.
Trustwave has released an Enterprise Pen Testing (EPT) service to help organizations identify known and unknown threats. EPT customers can receive pentesting performed by onshore, nearshore and offshore pentesters. They also can work with a local technical account manager who ensures that customers can get the most value from their pentesting investments.
Researchers at Trustwave’s SpiderLabs discovered another flavor of “infringement” phishing scams. The latest case resides under the umbrella of Meta and this time the targets are Instagram users via another Meta property: WhatsApp.
Trustwave announced enhanced Co-Managed SOC capabilities designed to maximize the threat detection and response value of SIEM (Security Information and Event Management) deployments, avoid unnecessary costs, and reduce alert noise by up to 90 percent.
Trustwave launched a new version of its Co-Managed SOC (security operations center) designed to maximize threat detection within security information and event management (SIEM) deployments.
In recent spam campaigns observed by Trustwave, attackers distributed ZIP or ISO archives disguised as invoices. Both file types can be opened natively on Windows without the use of additional applications.
As attackers continue to target the healthcare sector, Trustwave SpiderLabs’ Ed Williams shares how the same level of preparation as medical emergencies is increasingly essential for cyber threats.
In an interview with TechStrong’s Mike Vizard, SpiderLabs Senior Security Research Manager Karl Sigler explains how penetration testing is being used for both good and bad.
Trustwave’s research and intelligence team SpiderLabs published research about bugs in Canon Medical's Virea View that could allow cyberattackers to access several sources of sensitive patient data.
Trustwave shares how organizations are falling short when it comes to skilled cybersecurity professionals; however, the reason may be less about the number of professionals in the industry and more about the number of professionals with the right level of skills and training.
Threat actors continuously scan the internet to gain the advantage of organizations with slow or outdated patching process. A new Trustwave report shares why having a proactive approach to identifying and patching vulnerabilities is incredibly important to having a good security posture.
A new Trustwave report shows that significantly more CVEs will be published this year, and that some organizations are still vulnerable from older, unpatched CVEs.
Trustwave customer Children’s National Hospital shares how it’s improving its security posture in the growing threat environment with Trustwave. Breaches, hacks, and ransomware attacks are not only incredibly costly — they are ultimately a public health threat because they can compromise hospitals and healthcare workers’ abilities to provide care.
A new report from Trustwave shows that Ukraine is fighting a battle with Russia in cyber space, as well as a physical war. Russia has been using 'cyber warfare' on Ukraine since the physical invasion started in late February.
A study from Trustwave looks at the many Russian state cyberweapons subsequently unleashed against Ukraine. There is one common factor: they are all targeted specifically at and within Ukraine.
Trustwave’s Cyber Advisory Practice Lead Darren Van Booven shares why OT security needs to be a primary concern and organizations must urgently re-evaluate their security strategy.
Trustwave's SpiderLabs, which keeps tabs on prices for various products and services on the Dark Web, describes VPN credentials as the most expensive records in underground forums. According to Trustwave, prices for VPN access can go as high as $5,000 — and even higher — depending on the kind of organization and access it provides.
Stolen credit card data, VPN access credentials and other confidential info can be bought for as little as $8 on dark corners of the web. That’s according to researchers at SpiderLabs, the hacking and investigation team of cybersecurity company Trustwave, who conducted an extensive study into what cybercriminals charge for stolen data on the dark web.
Over 3,000 emails had phishing URLs using IPFS during the last 90 days, indicating the growing popularity of IPFS for phishing sites, a study from Trustwave revealed.
The distributed, peer-to-peer (P2P) InterPlanetary File System (IPFS) has become a hotbed of phishing-site storage: Thousands of emails containing phishing URLs utilizing IPFS are showing up in corporate inboxes. According to a report from Trustwave SpiderLabs, the company found more than 3,000 of these emails within its customer telemetry in the last three months.
Sign up to receive the latest security news and trends from Trustwave.