Loading...
Newsroom

Media Coverage

Trustwave Media Coverage chronicles news articles and TV spots featuring commentary and insights from our experienced experts and enlightening studies.

The Number of CVEs Published This Year is on Track to Exceed 2021

Threat actors continuously scan the internet to gain the advantage of organizations with slow or outdated patching process. A new Trustwave report shares why having a proactive approach to identifying and patching vulnerabilities is incredibly important to having a good security posture.

Poor Healthcare Cybersecurity is a Thread to Public Health

Trustwave customer Children’s National Hospital shares how it’s improving its security posture in the growing threat environment with Trustwave. Breaches, hacks, and ransomware attacks are not only incredibly costly — they are ultimately a public health threat because they can compromise hospitals and healthcare workers’ abilities to provide care.

Thinking Holistically: Rethinking OT Security Strategy

Trustwave’s Cyber Advisory Practice Lead Darren Van Booven shares why OT security needs to be a primary concern and organizations must urgently re-evaluate their security strategy.

A Ransomware Explosion Fosters Thriving Dark Web Ecosystem

Trustwave's SpiderLabs, which keeps tabs on prices for various products and services on the Dark Web, describes VPN credentials as the most expensive records in underground forums. According to Trustwave, prices for VPN access can go as high as $5,000 — and even higher — depending on the kind of organization and access it provides.

How Cybercriminals Sell Credit Card and VPN Data on the Dark Web

Stolen credit card data, VPN access credentials and other confidential info can be bought for as little as $8 on dark corners of the web. That’s according to researchers at SpiderLabs, the hacking and investigation team of cybersecurity company Trustwave, who conducted an extensive study into what cybercriminals charge for stolen data on the dark web.

IPFS Sites Increasingly Used for Phishing Attack

Over 3,000 emails had phishing URLs using IPFS during the last 90 days, indicating the growing popularity of IPFS for phishing sites, a study from Trustwave revealed.

1,000s of Phishing Attacks Blast Off from InterPlanetary File System

The distributed, peer-to-peer (P2P) InterPlanetary File System (IPFS) has become a hotbed of phishing-site storage: Thousands of emails containing phishing URLs utilizing IPFS are showing up in corporate inboxes. According to a report from Trustwave SpiderLabs, the company found more than 3,000 of these emails within its customer telemetry in the last three months.

The Decade in Vulnerabilities and Why They Persist

Trustwave’s research and intelligence team SpiderLabs published research on the most egregious network security flaws of the past decade - from 2011 to 2021.

Top 10 Cybersecurity Attacks of Last Decade Show What is to Come: Report

Overview: With a backdrop of the number of security incidents and vulnerabilities increasing in volume and sophistication, Trustwave shares the top 10 network vulnerabilities in no particular order that defined the decade and “won’t be forgotten.”

New phishing technique lures users with fake chatbot

A new Trustwave report details phishing techniques cybercriminals use to trick users into providing their credit card data through fake chatbots. The phishing email appears to originate from DHL, stating there was a package delivery problem.

What We've Learned in the 12 Months Since the Colonial Pipeline Attack

Darren Van Booven, Lead Principal Consultant at Trustwave explains why the demand for operational technology security services demand has doubled since Colonial Pipeline as leaders call for security system audits and assessments, ransomware protection strategies, and detection and response capabilities for advanced threats, such as cybergangs.

Watch Out For This Chameleon Phishing Scheme

Trustwave SpiderLabs encountered a phishing scheme that tricks victims into giving away their email credentials. The scheme acts like a chameleon by changing and blending its color based on its environment.

Stay Connected


Subscribe

Sign up to receive the latest security news and trends from Trustwave.

No spam, unsubscribe at any time.