CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Into the Breach: How 2020 Became A Tipping Point for Cybersecurity

In the year 2020, the concept of cybersecurity was thrust into the spotlight in an unprecedented way thanks to the FireEye Data Breach & SolarWinds Orion Compromise. The world is still trying to assess the reach and scope of this massive breach, which is expected to have exposed data across the U.S. government, including the White House, the Department of Defense and even the agency that maintains the U.S. nuclear weapons arsenal.

Even worse, the breach is now known to extend beyond the realm of government, as critical infrastructure and private organizations across the world have also been compromised. SolarWinds reported in an SEC filing that almost 18,000 of its private industry customers may have been exposed to the hack. Assessing the full extent of the harm done to global organizations is expected to take months.

The perpetrator of this attack is widely understood to be executed or backed by a nation-state, as the innovation and meticulous planning that made this compromise possible point to a truly impressive level of sophistication. A range of United States Senators have likened the incident to an act of war and called for retaliation, while the incoming Joe Biden presidential administration has issued a statement promising to impose a “substantial cost” on the perpetrators. 

While many have opined that this breach is not an attack, but rather a continuation of the cyber espionage that nation states, including the United States, have long employed against each other, our colleagues at Microsoft have described it as a moment of reckoning – and that, in our point of view, properly reflects the gravity of this moment in time.

Cybersecurity is no longer simply an individual concern, a business concern, or a governmental concern. Cybersecurity is a human concern. And its potential to affect human affairs – and perhaps even the course of history – is growing exponentially. It’s time to reassess that risk.

Consider that, within the lifetimes of most people reading these words, our daily lives will depend almost entirely on the infrastructure of the Internet. Many of us are likely to be working and learning remotely. Our cars will be self-driving. Our health care will be virtual. Artificial Intelligence (AI) will manage our calendars, our communication and our homes. The already staggering amount of personal information that’s currently vulnerable to exploitation will have increased. The organizations that we work for will be even more reliant on information security, along with tools like automation and artificial intelligence – as will virtually all governments around the world. Critical infrastructure will be more vulnerable, and the nexus between cybersecurity and the capacity to inflict real-world harm, even deaths, will be more acute. Cyber exploits, whether weaponized or not, will increasingly carry the potential to tip the world into a chain of events that could potentially spiral out of control – and perhaps prove calamitous.

As our reliance on cyber infrastructures continues to increase, the need for cybersecurity will become ever more vital. But the rules of the game also need to change. While cybersecurity practitioners are helping to thwart and mitigate cybercrime on a daily basis, invulnerability will never be possible. The depth of human ingenuity is boundless – and the financial rewards for practicing cybercrime are too tempting. As long as threat actors, especially nation state actors, are allowed to operate with relative impunity, enjoying safe havens around the globe where they are often immune from consequences to their malicious actions, our risks will continue to increase.  

It’s time for governments around the world to rethink the framework of cybersecurity. New rules, regulations and safeguards need to be enacted. Stricter consequences need to be imposed. But more than that, a new awareness of – and respect and caution towards – the potential consequences of inflammatory cyber behavior should prevail.

We believe that the year 2020 will be remembered as a tipping point for the cybersecurity industry. As we go forward, it’s up to all of us to decide whether it tips us toward a greater level of safety – or even greater peril.


EBOOK

The Underground Economy

What happens after cyber thieves successfully compromise businesses? If you think siphoning sensitive data instantly leads to money in their account, you're wrong. What proceeds is series of anonymous paths they can take to ultimately reap their reward. In this comprehensive guide, the Trustwave SpiderLabs team provides you with a view into the deep abyss of the dark web - where the criminally minded operate to hide their tracks from law enforcement.

Latest Trustwave Blogs

The Power of Red and Purple Team Drills in Enhancing Offensive Security Programs

Despite investing in costly security solutions, keeping up with patches, and educating employees about suspicious emails, breaches still occur, leaving many organizations to wonder why they are...

Read More

Balancing Innovation and Security: How Offensive Security Can Help Navigate the Tech Industry’s Dual Challenges

Two of the greatest threats facing technology-focused organizations are their often-quick adoption of new technologies, such as artificial intelligence (AI), without taking security measures into...

Read More

Trustwave Government Solutions (TGS) Salutes New Mexico’s New Cybersecurity Executive Order

New Mexico Governor Michelle Lujan Grisham issued an Executive Order to shore up the state’s cybersecurity readiness and better safeguard sensitive data by conducting a state-wide security assessment...

Read More