CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Our Top Blogs of 2020

2020 was truly a troubling year for the world – and a consequential one for the field of cybersecurity. From the sudden and massive shift to working from home because of the COVID-19 pandemic, to the discovery of one of the biggest cyber-attacks in history, the events of 2020 and their consequences will be long remembered.

Those groundbreaking developments were reflected in the writing on the Trustwave and Trustwave SpiderLabs blogs, which covered some of the most significant and far-reaching discoveries our teams have ever made, including a massive malware operation that targeted organizations doing business in China and our U.S. voter database discovery. Look below to recap our top blog posts of the year.

#1        The Golden Tax Department and the Emergence of GoldenSpy Malware

This discovery of a new malware family called GoldenSpy, embedded in tax payment software that a Chinese bank required corporations to install, made news around the world and trended on social media under the hashtag #GoldenSpy.

#2        Massive US Voters and Consumers Databases Circulate Among Hackers  

As covered by the N.Y. Times, NBC News and others, the Trustwave SpiderLabs team discovered massive databases with detailed information about U.S. voters and consumers offered for sale on several hacker forums – right before the U.S. election.

 


16716_gsr2020-cover-image
RESEARCH REPORT

2020 Trustwave Global Security Report

The 2020 Trustwave Global Security Report is a window into the latest developments in the world of cybercrime. Featuring data and analysis from Trustwave systems and security experts, it is a comprehensive review of the phenomena, trends and statistics that are shaping cybersecurity. Use it to help your organization gain insights on the tricks and techniques that cybercriminals have developed, with updated statistics on data compromise, email threats, exploits and malware, and database and network security. Armed with this knowledge, your organization will be better prepared to defend itself against ever evolving cyber threats – this year and beyond.


 

#3        25 Years of Threats: How Cybersecurity Has Evolved Since 1995

As Trustwave celebrated its 25th year anniversary, we looked back at how cybersecurity has evolved and changed by interviewing Ziv Mador, leader of the Trustwave SpiderLabs research team, whose fascinating career started with Microsoft R&D in 1996 and covered some of the biggest cyber scams in history. 

#4        Would You Exchange Your Security for a Gift Card?

A letter supposedly from a major retailer contained a gift card and a USB device. Spoiler alert… it was a scam. Thankfully our Trustwave SpiderLabs teams detected the hack and helped warn the public and the proper authorities.

#5        Vaccine for COVID-19 and Other Scams on the Dark Web

When the world suddenly shifted to a massive work from home posture, Trustwave SpiderLabs researchers began monitoring the Dark Web to see how cyber criminals would respond. As expected, the scams began immediately – and even included fake vaccine offers.

#6        What COVID-19 Has Taught Us About Cybersecurity

What lessons should organizations learn from the COVID-19 event? Are there any benefits, like possible cost-savings, that will carry through to the future? To find out, we interviewed a top cybersecurity thought leader.

#7        Phishing in a Bucket: Utilizing Google Firebase Storage

This phishing threat leveraged the reputation and service of the Google Cloud infrastructure and embedded Google firebase storage URLs in phishing emails. This blog post exposed the scam and offered remediation recommendations.

#8        10 Essential Cybersecurity Tips for Businesses

This downloadable infographic – presented by the global Telco Security Alliance – offered key insights that can benefit almost every organization.

#9        Getting MDR Right: How to Prepare Your Organization for Effective Managed Detection and Response

Managed Detection and Response (MDR) is growing rapidly, and this blog post helped organizations learn what they should do to prepare for effective endpoint detection and response and what to look for in an MDR provider.

#10      GO SMS Pro Vulnerable to Media File Theft

The Go SMS Pro messenger app was exposing sensitive data – including personal photos – to the Internet. Some of that data was found for sale on hacker forums. This exclusive Trustwave SpiderLabs  discovery was covered by hundreds of major media outlets around the world.

Latest Trustwave Blogs

Unlocking the Power of Offensive Security: Trustwave's Proactive Approach to Cyber Defense

Clients often conflate Offensive Security with penetration testing, yet they serve distinct purposes within cybersecurity. Offensive Security is a broad term encompassing strategies to protect...

Read More

Behind the Scenes of the Change Healthcare Ransomware Attack Cyber Gang Dispute

Editor’s Note – The situation with the Change Healthcare cyberattack is changing frequently. The information in this blog is current as of April 16. We will update the blog as needed. April 16, 2024:...

Read More

Law Enforcement Must Keep up the Pressure on Cybergangs

The (apparent) takedown of major ransomware players like Blackcat/ALPHV and LockBit and the threat groups’ (apparent) revival is a prime example of the Whack-a-Mole nature of combating ransomware...

Read More