CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
News Releases

Trustwave to Deliver Briefings at YSTS 3.0

Experts to Discuss Security Risks with Rich Internet Applications and Practical Database Security Testing

CHICAGO (June 18, 2009) - Trustwave, the leading provider of on-demand data security and payment card industry compliance management solutions to businesses and organizations throughout the world, will deliver multiple briefings at You Sh0t the Sheriff (YSTS) 3.0, 22 June, 2009, in São Paulo, Brazil. Kevin Stadmeyer, together with Jon Rose, and Wendel Henrique, all members of SpiderLabs, the advanced security team at Trustwave responsible for incident response and forensics, ethical hacking and application security, will deliver the separate presentations.

Kevin Stadmeyer and Jon Rose, Trustwave senior security consultants, will examine the security risks of Rich Internet Applications (RIA), which are used to enrich a Web application's user experience. RIAs are being deployed with increasing regularities without proper understanding of the security risks involved in implementation. Deploying Web applications without properly understanding RIA technologies can lead to the loss of sensitive business information and significantly increases the likelihood and severity of an attack against that organization.

Trustwave's SpiderLabs is one of the few groups with working knowledge and experience testing RIA technologies. Stadmeyer and Rose will demonstrate real-life code examples from both applications. They will present secure and insecure samples and will demonstrate ways to secure an insecure sample as a developer. They will also demonstrate how to attack these applications as a penetration tester.

"We have not found any Rich Internet Application research, as such, we initiated our own research effort," says Nicholas Percoco, vice president and head of SpiderLabs for Trustwave. "Our research will help developers build Rich Internet Applications that are more resistant to attack."

In a separate presentation, Wendel Henrique will demonstrate how to help secure leading database software. Such database technology is used in the data centers of 100 of the Fortune Global 100 companies. With wide-spread use, it is imperative that these databases are secure, as they store information related to the core business of the company, including customer and partner information, proprietary data, credit card data and more.

Using common scripts and codes, Henrique will demonstrate how the database can be compromised. He will review all the common steps necessary for an attack, including database identification, obtaining a database System Identifier (SID), gaining first access to the database, escalating privileges and finally back-door access for further probing.

If an attacker can exploit a custom or native database script, they may be able to escalate their privilege to administrator. As such, an attacker then has complete control over the entire database and consequently can execute commands in the operating systems or read, alter and/or delete any data in the database, such as credit card data. In complex environments, if one database system is compromised, attackers frequently are able to gain access to other databases due to insecure network connections.

"With evolving threat vectors resulting in more data compromises, businesses are required to secure their applications because ignorance is no longer a tolerated excuse," says Robert J. McCullen, chairman and CEO of Trustwave. "Trustwave will demonstrate how quickly these networks can be compromised and discuss how layered security is effective when keeping an environment protected."

About Trustwave
Trustwave is a leading provider of on-demand and subscription-based information security and payment card industry compliance management solutions to businesses and government entities throughout the world. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its flagship TrustKeeper® compliance management software and other proprietary security solutions including SIEM , WAF , EV SSL certificates  and secure digital certificates . Trustwave has helped hundreds of thousands of organizations-ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers-manage compliance and secure their network infrastructures, data communications and critical information assets. Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, Asia and Australia. For more information, visit https://www.trustwave.com/en-us/.

Latest News Releases

Trustwave Announces Strategic Global Partnership with Telarus

Chicago – April 23, 2024 – Trustwave, a global cybersecurity and managed security services leader, today announced a strategic partnership with Telarus, a leading Technology Services Distributor...

Read More

Trustwave Named a Major Player in New IDC MarketScape on Worldwide Cybersecurity Consulting Services

CHICAGO – April 3, 2024 – Trustwave, a leading cybersecurity and managed security services provider, was named a Major Player in the IDC MarketScape: Worldwide Cybersecurity Consulting Services 2024...

Read More

Trustwave Adds Threat Intelligence as a Service to its Offensive Security Offering Portfolio

CHICAGO – April 2, 2024 – Trustwave , a global cybersecurity and managed security services leader, today announced the launch of Trustwave Threat Intelligence as a Service (TIaaS). Trustwave TIaaS...

Read More