Trustwave achieves verified MXDR solution and FastTrack ready partner status from Microsoft. Learn More

Trustwave achieves verified MXDR solution and FastTrack ready partner status from Microsoft. Learn More

Managed Detection & Response

Eradicate cyberthreats with world-class intel and expertise

Managed Security Services

Expand your team’s capabilities and strengthen your security posture

Consulting & Professional Services

Tap into our global team of tenured cybersecurity specialists

Penetration Testing

Subscription- or project-based testing, delivered by global experts

Database Security

Get ahead of database risk, protect data and exceed compliance requirements

Email Security & Management

Catch email threats others miss with layered security & maximum control

Co-Managed SOC (SIEM)

Eliminate alert fatigue, focus your SecOps team, stop threats fast, and reduce cyber risk

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
The Trustwave Approach
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Platform
SpiderLabs Fusion Center
Security Operations Centers
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

5 Security Things to Know for the Week of May 15

Follow Trustwave on Twitter, connect with us on LinkedIn and like us on Facebook

1)  A historic, fast-spreading ransomware worm attack that used a stolen exploit, slowed only by a "kill switch" flaw in its own design, struck companies in more than 100 companies running unsupported versions of Windows - and more damage may be yet to come.

2) To additionally help halt the spread of the worm, Microsoft took the unusual step of issuing emergency patches for no-longer-supported operating systems.

3) In addition, the company called out government "exploit stockpiling" after it was discovered that the attack copied hacking tool methods stolen from the U.S. National Security Agency.

4) Microsoft (and Adobe) kept busy even before WannaCry, issuing the May monthly patch update, while a day earlier it distributed an out-of-band fix for a "crazy bad" wormable Windows zero-day.

5) Google tightened its OAuth policies to defend against phishing attacks in light of the Google Docs scam.