Gartner Magic Quadrant for Managed Security Services 2018: Analysis
December 23, 2018
So what’s new for 2018? Trustwave moved into the enviable Leaders Quadrant, while Capgemini, DXC Technology and Fujitsu were added to the overall rankings.
Unpatched Kernel-Level Vuln in IBM Security Tool for Apple MacOS Revealed
December 21, 2018
Researchers disclose signedness bug in driver used by IBM Trusteer Rapport endpoint security tool after IBM fails to deliver timely patch.
Gift Cards Make Popular Gifts Targets for Scammers
December 21, 2018
Gift cards are popular gifts this time of year, but they’re also big targets for theft. Americans have spent almost $30 billion on gift cards this holiday season but have also lost more than $50 million so far this year in gift card-related scams, according to the Federal Trade Commission.
Dark Web Recruitment: In the Web’s Lawless Underbelly There are Still Rules
December 07, 2018
What we see when we browse the web is just the tip of the iceberg. Hidden below the surface, accessible only by the Tor browser, exists a marketplace in which criminals can sell drugs, weapons and stolen data with relatively little surveillance.
60 Cybersecurity Predictions for 2019
December 03, 2018
Just like last year, this year’s 60 predictions reveal the state-of-mind of key participants in the cybersecurity industry (on the defense team, of course) and cover all that’s hot today.
The SOC Essentials for 2019
November 21, 2018
What are the key differences between building a SOC for a large enterprise vs. for a small to midsized organization? Trustwave's Kory Daniels explains the distinction and outlines the must-have skills.
Hackers Infect Make-A-Wish Foundation Website With Code That Generates Cryptocurrency
November 20, 2018
Hackers successfully broke into the international website of the Make-A-Wish Foundation and inserted malicious computer code which used the computers of people visiting the site to generate cryptocurrency.
Hacker Brief: Criminals With No Shame Hit Make-A-Wish Website
November 19, 2018
Over the last year or so, cryptojacking—which forces your computer to mine cryptocurrency for bad guys when you visit an infected site—has become one of the internet’s most pervasive scourges.
How to Train Your Team (and Organization) to Effectively Use Threat Intelligence
November 13, 2018
Threat intelligence has transformed the information security world for the better but it’s not always leveraged in the best way possible by organizations and departments. The sheer amount of information, providers, platforms, and types of threat intelligence and data available, make it difficult to confidently ensure an organization is making the most of their threat intelligence.
Ransomware Infection? Here’s How You Control the Damage
November 12, 2018
Eighteen months ago, ransomware hit headlines around the world with the WannaCry and Petya outbreaks which spread across 150 countries. While lower attack volume may suggest that file-encrypting ransomware is no longer a risk, that’s not the case.
Five Key Considerations when Developing a Security Operations Center
November 08, 2018
Ensuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of many organization’s security strategy today. However, establishing a SOC is a complicated endeavor, particularly when it comes to balancing budget and resource limitations in an increasingly complex security landscape.
Why is Burnout so Prevalent in the Cybersecurity Industry?
November 07, 2018
A role in cybersecurity, while rewarding, can also be extremely taxing psychologically. We spoke to Chris Schueler from Trustwave about why burnout is so prevalent and how it can be addressed.
Red Alert Android Trojan for Rent at $500 Per Month
November 05, 2018
The Red Alert 2.0 Android Trojan first detailed in September last year is currently available for rent on underground forums at $500 per month, Trustwave reports.
Virtual Case Notes: 10 Years After Fighting Conficker Exploit Security Researcher Reflects
October 26, 2018
As the last full week of the 15th National Cybersecurity Awareness Month comes to a close, security experts are reflecting on the 10-year anniversary of one of the most significant computer vulnerabilities and cyberattacks of the time.
Like it or not Business Must Swallow TLS Deprecation Medicine
October 18, 2018
In coordinated statements, the big four in the browser application world have finally announced the deprecation of Transport Layer Security (TLS) protocol v1.0 and v1.1.
Singtel to Buy Australian Cyber Security Firm for A$23.3 Million
October 10, 2018
Singtel’s Australian subsidiary has inked a deal to buy a privately held cyber security firm incorporated in Victoria state, which will be integrated into the group’s Trustwave cyber security arm.
Top Cybersecurity Facts Figures and Statistics for 2018
October 10, 2018
Looking for hard numbers to back up your sense of what’s happening in the cybersecurity world? We dug into studies and surveys of the industry’s landscape to get a sense of the lay of the land – both in terms of what’s happening and how your fellow IT pros are reacting to it.
AVANT Trustwave Partner to Increase Security Sales in The Channel
October 09, 2018
AVANT Communications has forged an alliance with Trustwave, an MSSP that helps businesses fight cybercrime, protect data and reduce risk. The alliance gives AVANT’s thousands of channel sales professionals access to Trustwave’s portfolio of managed security services covering threats, vulnerabilities and compliance.
Inside the Dark Web’s ‘Help Wanted’ Ads
October 08, 2018
How cybercriminals recruit everyone from car drivers to corporate insiders and pay them according to the risk they assume.
Signed Check Used to Take $4500 from Couple’s Account
October 03, 2018
A year ago, one couple wrote a check for $625. Then, someone tried to deposit more than a dozen other checks worth around $20,000 using that original signed check as their counterfeit canvas. CBS 2’s Dorothy Tucker investigates how that can happen.
How to Defend Enterprise Apps with Threat Modeling: 4 Lessons Learned
October 02, 2018
Security experts have long recommended that security teams incorporate threat modeling into their process of analyzing their corporate assets. Taking a structured approach to analyzing risks to information infrastructure can reveal new threats that aren’t contained in compliance requirements or industry standards.
PureVPN Windows Client Leaked Passwords
September 27, 2018
PureVPN has had two vulnerabilities which would allow hackers to retrieve stored passwords through the VPN client. This was confirmed by Trustwave’s research and the VPN provider itself.
There’s a Booming Job Market for Corporate Insiders Willing to Share Secret Info with Cyber Criminals
September 20, 2018
Many companies, especially in big technology, banking and telecom, face heavy incentives overseas for employees to sell internal information or access. The problem is so common that in some jurisdictions, criminal enterprises post “job ads” looking for specific insiders to aid in targeted schemes.
A Look at the Windy City’s Newest Cyber Command Center
September 18, 2018
Ask anyone what a quintessential cybersecurity command center looks like, and they’ll likely launch into a description that includes a dark room with vibrant accent lighting and a collection of screens displaying an array of information from global news to maps highlighting real-time cyberattacks.
How Trustwave Keeps an Eye on Hackers
September 12, 2018
Look inside the Loop command center where the information-security company is stepping up its cybersecurity game.
Threat Hunters and Ethical Hackers: Trustwave’s Chicago Command Center Battles Cybercriminals
September 12, 2018
Scrolling down a jumbo screen Trustwave’s Loop office is a list of personal information. There are emails, names, passwords, credit card numbers and expiration dates – a gold mine for anyone trying to steal someone’s identity.
The Secrets of Social Engineering
September 06, 2018
We’ve all heard the stories in the news about cyberattacks enabled by unwitting consumers: fraudsters hacking into individuals’ email accounts and sending messages to their contacts requesting money; consumers providing payment information to phony websites; cybercriminals pretending to be relatives “in urgent needs of funds.”
Unpicking the Cyber-Crime Economy
August 26, 2018
Turning virtual cash into real money without being caught is a big problem for successful cyber-criminals. They often have to get creative when “cashing out” or laundering the money they have stolen, according to a security expert.
Cross-Site Scripting Flaw in Apache ActiveMQ Threatens Web Visitors
August 24, 2018
Researchers have found a cross-site scripting (XSS) flaw in Apache ActiveMQ that could enable a remote attacker with no privileges to launch an array of attacks against visitors to compromised websites.
Thought Leader – Chris Schueler
August 23, 2018
At a time when cyberattacks and threats are on a sharp rise both in frequency and severity, Chris Schueler has been a driving force in shaping how large organizations incorporate the managed security model.