CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

5 Security Things to Know This Week

Here are five major security news items to help you start your week:

  • PCI rules take effect soon: If you handle credit and debit cards - especially if you are a smaller merchant - take note. Rule changes enacted through PCI versions 3.0 and 3.1 become mandatory on June 30. Here is what you need to know about your new responsibilities.
  • POS devices remain hot target: The onslaught of attacks on point-of-sale (POS) systems impelled many of the 3.0 and 3.1 payment card requirement changes. One way thieves are succeeding in these attacks is by installing malware through the distribution of spam emails that are opened on POS computers
  • The thing about "internet of things": It's difficult to stem the tide of data breaches when the number of web-enabled devices is significantly rising by the day. In many cases, these internet-connected systems have not been properly secured and contain vulnerabilities that make them prone to major security and privacy risks. How big is the problem?
  • A costly tab: The bill for cybersecurity breaches is going up. An annual Ponemon Institute concludes that the average compromise costs companies $3.8 million, a jump of 23 percent in two years. The rising figure means organizations are failing at two things: addressing vulnerabilities that enable breaches and - if a breach does occur - identifying it and mitigating the damage as quickly as possible before the liability starts adding up.
  • U.S. lagging in card security: The United States is a leader in many things, but credit card security is apparently not one of them. A new report shows that roughly half of all global credit card fraud occurs in America, mainly due to the ease by which hackers can steal card numbers and create cloned cards.

No matter the industry you're in or the challenge or compliance mandate you're facing, Trustwave can help. Learn how here.

Latest Trustwave Blogs

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Editor’s Note – The situation with the Change Healthcare cyberattack is changing frequently. The information in this blog is current as of April 16. We will update the blog as needed. April 16, 2024:...

Read More

Law Enforcement Must Keep up the Pressure on Cybergangs

The (apparent) takedown of major ransomware players like Blackcat/ALPHV and LockBit and the threat groups’ (apparent) revival is a prime example of the Whack-a-Mole nature of combating ransomware...

Read More

Effective Cybersecurity Incident Response: What to Expect from Your MDR Provider

Companies engage with a managed detection and response (MDR) provider to help ensure they detect cyber threats before they do any damage. The "response" part of the MDR moniker is key to that effort,...

Read More