LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP.  Learn More

LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP.  Learn More

Services
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Microsoft Security
Unlock the full power of Microsoft Security
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
circles-2-nr

Media Coverage

Trustwave Media Coverage chronicles news articles and TV spots featuring commentary and insights from our experienced experts and enlightening studies.

Threatpost

Criminals Exclusively Target Bank Staff Credentials with RAT-Laced MS Publisher Email Attachments

August 21, 2018

Cybercriminals have chosen one of Microsoft’s lesser known Office document creation apps Publisher (.pub) as the vehicle for distributing password stealing malware intended for employees at thousands of banks around the word.

ThirtyK

How Your LinkedIn Exposes You to Facial Recognition Hacks

August 08, 2018

From Facebook overshares to accidental password posts on Twitter, there are many ways in which Web personas leak things of use to malicious hackers.

Siliconrepublic

New Facial Recognition Tool Tracks Targets Across Different Social Networks

August 08, 2018

Researchers at Trustwave released a new open-source tool called Social Mapper, which uses facial recognition to track subjects across social media networks.

CSO Australia

200000 Routers Turned Into Mindless Crypto Coin Mining Zombies

August 03, 2018

Somewhere out there a cybercriminal is lining his or her pockets with cryptocurrency. Whoever it is isn’t using powerful computer to do the mining. Instead, this individual is using an ever-growing army of enslaved routers to do the dirty work.

SC Media

MikroTik Routers Enslaved in Massive Coinhive Cryptojacking Campaign

August 03, 2018

According to Trustwave researcher Simon Kenin, on July 31, a surge in Coinhive activity was detected which indicated that a malicious cryptocurrency mining operation was underway.

TechTarget

Cryptojacker Campaign Hits MikroTik Routers

August 02, 2018

More than 200,000 routers hit with a sophisticated cryptomining attack that appears to be spreading.

Dark Reading

A vulnerability in some versions of the Oracle Solaris enterprise OS could allow attackers to edit code in the memory and exploit it to gain full root control over a machine.

July 24, 2018

A vulnerability in some versions of the Oracle Solaris enterprise OS could allow attackers to edit code in the memory and exploit it to gain full root control over a machine.

MISTI

Dust Yourself Off and Try Again: Ancient Solaris Patch Missed the Mark

July 24, 2018

A vulnerability first detected and “resolved” years ago in Oracle’s Unix OS, Solaris, has resurfaced, necessitating a fix in Big Red’s latest quarterly patch batch.

HelpNetSecurity

Oracle Fixes Solaris Vulnerability that Could Allow Kernel Level Privilege Escalation

July 24, 2018

A vulnerability in some versions of the Oracle Solaris enterprise OS could allow attackers to edit code in the memory and exploit it to gain full root control over a machine.

Business Insider (subscription only)

DanaBot Trojan Targets Bank Customers In Phishing Scam

July 16, 2018

The recently-discovered DataBot banking trojan is making the rounds in a phishing campaign that targets potential victims with fake invoices from software company MYOB.

CNBC

What Does the EU Cybersecurity Vote Mean for the Average Person?

July 12, 2018

The European Parliament’s industry committee wants to give ENISA more power and create a rulebook for connected devices.

Security Intelligence

Why Cryptocurrency Threats Aren’t Going Away Anytime Soon

July 05, 2018

In the 2018 Trustwave Global Security Report, which looks at a wide range of computing and internet threats, risks and vulnerabilities across more than a dozen industries and 21 countries, cryptocurrency has a starring role.

SC Media

Linux Becomes Major Cryptomining Target

July 04, 2018

Not only has cryptojacking hit the big time, but now attackers are moving to target Linux.

HelpNetSecurity

Third-Party Cyber Security: Strengthening the Weak Link

July 02, 2018

As companies adopt new technologies in short timeframes, they are increasingly turning to outsourcing resulting in third-party providers having access to sensitive data more than ever before.

Dark Reading

EFF’s STARTTLS Everywhere Aims to Protect Email in Transit

June 28, 2018

The EFF’s new STARTTLS Everywhere initiative aims to secure email as it transits the internet between mail servers to prevent mass surveillance, as well as email spoofing.

SC Media

Why Cybercriminals are Turning to Cryptojacking for Easy Money

June 22, 2018

The cryptocurrency market has seen an incredible amount of attention and hype over the last year, culminating with Bitcoin values soaring by more than 1,300 percent in 2017.

Silicon Republic

Cover Your Bases: Areas to Focus on in Your Information Security Strategy

June 21, 2018

From connected devices to insider threats, the modern-day cybersecurity professionals has their hands full when it comes to ensuring their organization measurably reduces risk.

Forbes

Weaponizing IPv6 to Bypass IPv4 Security

June 12, 2018

Just because you’re not yet using IPv6 doesn’t mean you’re safe from the protocol’s attack vectors.

The Register

These Terrifying Ads Selling Violent Services Don’t Show the True Secret of the ‘Dark Web’ – That Criminals Behave a lot like Regular Companies

June 07, 2018

What you can’t see is that these cyber criminals behave among one another in much the same way legit businesses behave to legit customers, a security researcher tells Business Insider.

TechCrunch

Don’t expect your bank’s virtual cards to be the ultimate security solution

June 01, 2018

Finding out you’re a data breach victim is bad enough. But the process of canceling credit cards and checking statements for suspicious activity will likely be an even bigger headache.

Trusted Reviews

What’s the Biggest Security Threat for 2018? Malware

May 31, 2018

What will be the most significant threat to cybersecurity teams in 2018? According to a May 2018 survey from information security company Trustwave, 22 percent of full-time information technology (IT) professionals said preventing malware, including ransomware, was their biggest obligation for 2018.

Infosecurity

GDPR is on the books Google Facebook face lawsuits others scramble to comply

May 25, 2018

GDPR has been in play for less than 24 hours and several lawsuits have already been filed in the EU against Facebook and Google claiming each in not abiding by the new privacy regulations.

MeriTalk

Pressures impacting security pros are up threats are turing up the heat

May 24, 2018

Trustwave released the 2018 Security Pressures Report based on a global survey of 1,600 full-time IT professionals who are security decision makers or security influencers within their organization.

Wall Street Journal

Growing Job Pressures Increase Risk of Burnout for Cybersecurity Professionals

May 23, 2018

A new Trustwave survey shows information security executives and practitioners are under increasing pressure from trying to keep up with threats and compliance mandates.

MSSP Alert

Not so Safe in the Cloud – a Quarter of Enterprises Hit by Cryptojackers

May 17, 2018

Newly published research reveals the poor state of enterprise cloud security, as evidenced by the advance of cryptojacking within these environments.

Eweek

Cyberthreats: A 10-Year Perspective

May 15, 2018

This year marks a historic decade-long milestone of the Trustwave Global Security Report (GSR), an annual report that touches on the current state of cybersecurity and the evolving threat landscape.

Badcredit.org

IPV6 and IoT Security: What Should you Know?

May 15, 2018

IPv4 is stretched to breaking point and IPv6 migration is an inevitability as IoT devices multiply.

IT World Canada

Exploit puts popular web and mobile apps at risk

May 14, 2018

A new exploit could allow users to bypass security checks in Electron, a popular cross-platform development framework.

Chicago Tribune

Have you updated your Electron app?

May 14, 2018

Electron – the widely used desktop application framework that renders top programs – suffered from a security vulnerability that potentially allows miscreants to execute evil code on victims’ computers.

TechRepublic

Internet security: A power user’s guide to staying safe online

May 11, 2018

There are lots of straightforward steps you can take to protect your privacy online. Spend a couple of minutes now to get yourself set up, and you’ll never worry about it again.