Newly discovered security bugs in Lifesize videoconferencing products can be remotely exploited, giving attackers the ability to spy on a target organization or attack other devices.
Trustwave Secure Email Gateway Now Supports Microsoft Azure RMS
Today’s topics include Trustwave improving its Secure Email Gateway to reduce email threats.
Trustwave Improves Secure Email Gateway to Reduce Email Threats
Trustwave announced the latest iteration of its email security platform with the unveiling of Secure Email Gateway (SEG) 8.2. Among the highlights is support for the Microsoft Azure Rights Management System (RMS), which is used to protect against data loss and unauthorized access.
Why Good Database Security Planning is Essential for Protecting a Company’s Most Important Assets
Attackers know that shutting companies out of their own data can quickly cripple an organization and put the pressure on to consider paying the ransom.
The Year Cryptojacking Ate The Web
Cybersecurity can feel like a chaotic free-for-all sometimes, but it’s not every day that a whole new conceptual type of attack crops up. Over the last 15 months, though, cryptojacking has been exactly that. It’s officially everywhere, and it’s not going away.
Gartner Magic Quadrant for Managed Security Services 2018: Analysis
So what’s new for 2018? Trustwave moved into the enviable Leaders Quadrant, while Capgemini, DXC Technology and Fujitsu were added to the overall rankings.
Unpatched Kernel-Level Vuln in IBM Security Tool for Apple MacOS Revealed
Researchers disclose signedness bug in driver used by IBM Trusteer Rapport endpoint security tool after IBM fails to deliver timely patch.
Gift Cards Make Popular Gifts Targets for Scammers
Gift cards are popular gifts this time of year, but they’re also big targets for theft. Americans have spent almost $30 billion on gift cards this holiday season but have also lost more than $50 million so far this year in gift card-related scams, according to the Federal Trade Commission.
Dark Web Recruitment: In the Web’s Lawless Underbelly There are Still Rules
What we see when we browse the web is just the tip of the iceberg. Hidden below the surface, accessible only by the Tor browser, exists a marketplace in which criminals can sell drugs, weapons and stolen data with relatively little surveillance.
60 Cybersecurity Predictions for 2019
Just like last year, this year’s 60 predictions reveal the state-of-mind of key participants in the cybersecurity industry (on the defense team, of course) and cover all that’s hot today.
The SOC Essentials for 2019
What are the key differences between building a SOC for a large enterprise vs. for a small to midsized organization? Trustwave's Kory Daniels explains the distinction and outlines the must-have skills.
Hackers Infect Make-A-Wish Foundation Website With Code That Generates Cryptocurrency
Hackers successfully broke into the international website of the Make-A-Wish Foundation and inserted malicious computer code which used the computers of people visiting the site to generate cryptocurrency.
Hacker Brief: Criminals With No Shame Hit Make-A-Wish Website
Over the last year or so, cryptojacking—which forces your computer to mine cryptocurrency for bad guys when you visit an infected site—has become one of the internet’s most pervasive scourges.
How to Train Your Team (and Organization) to Effectively Use Threat Intelligence
Threat intelligence has transformed the information security world for the better but it’s not always leveraged in the best way possible by organizations and departments. The sheer amount of information, providers, platforms, and types of threat intelligence and data available, make it difficult to confidently ensure an organization is making the most of their threat intelligence.
Ransomware Infection? Here’s How You Control the Damage
Eighteen months ago, ransomware hit headlines around the world with the WannaCry and Petya outbreaks which spread across 150 countries. While lower attack volume may suggest that file-encrypting ransomware is no longer a risk, that’s not the case.
Five Key Considerations when Developing a Security Operations Center
Ensuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of many organization’s security strategy today. However, establishing a SOC is a complicated endeavor, particularly when it comes to balancing budget and resource limitations in an increasingly complex security landscape.
Why is Burnout so Prevalent in the Cybersecurity Industry?
A role in cybersecurity, while rewarding, can also be extremely taxing psychologically. We spoke to Chris Schueler from Trustwave about why burnout is so prevalent and how it can be addressed.
Red Alert Android Trojan for Rent at $500 Per Month
The Red Alert 2.0 Android Trojan first detailed in September last year is currently available for rent on underground forums at $500 per month, Trustwave reports.
Virtual Case Notes: 10 Years After Fighting Conficker Exploit Security Researcher Reflects
As the last full week of the 15th National Cybersecurity Awareness Month comes to a close, security experts are reflecting on the 10-year anniversary of one of the most significant computer vulnerabilities and cyberattacks of the time.
Like it or not Business Must Swallow TLS Deprecation Medicine
In coordinated statements, the big four in the browser application world have finally announced the deprecation of Transport Layer Security (TLS) protocol v1.0 and v1.1.
Singtel to Buy Australian Cyber Security Firm for A$23.3 Million
Singtel’s Australian subsidiary has inked a deal to buy a privately held cyber security firm incorporated in Victoria state, which will be integrated into the group’s Trustwave cyber security arm.
Top Cybersecurity Facts Figures and Statistics for 2018
Looking for hard numbers to back up your sense of what’s happening in the cybersecurity world? We dug into studies and surveys of the industry’s landscape to get a sense of the lay of the land – both in terms of what’s happening and how your fellow IT pros are reacting to it.
AVANT Trustwave Partner to Increase Security Sales in The Channel
AVANT Communications has forged an alliance with Trustwave, an MSSP that helps businesses fight cybercrime, protect data and reduce risk. The alliance gives AVANT’s thousands of channel sales professionals access to Trustwave’s portfolio of managed security services covering threats, vulnerabilities and compliance.
Inside the Dark Web’s ‘Help Wanted’ Ads
How cybercriminals recruit everyone from car drivers to corporate insiders and pay them according to the risk they assume.
Signed Check Used to Take $4500 from Couple’s Account
A year ago, one couple wrote a check for $625. Then, someone tried to deposit more than a dozen other checks worth around $20,000 using that original signed check as their counterfeit canvas. CBS 2’s Dorothy Tucker investigates how that can happen.
How to Defend Enterprise Apps with Threat Modeling: 4 Lessons Learned
Security experts have long recommended that security teams incorporate threat modeling into their process of analyzing their corporate assets. Taking a structured approach to analyzing risks to information infrastructure can reveal new threats that aren’t contained in compliance requirements or industry standards.
PureVPN Windows Client Leaked Passwords
PureVPN has had two vulnerabilities which would allow hackers to retrieve stored passwords through the VPN client. This was confirmed by Trustwave’s research and the VPN provider itself.
There’s a Booming Job Market for Corporate Insiders Willing to Share Secret Info with Cyber Criminals
Many companies, especially in big technology, banking and telecom, face heavy incentives overseas for employees to sell internal information or access. The problem is so common that in some jurisdictions, criminal enterprises post “job ads” looking for specific insiders to aid in targeted schemes.
A Look at the Windy City’s Newest Cyber Command Center
Ask anyone what a quintessential cybersecurity command center looks like, and they’ll likely launch into a description that includes a dark room with vibrant accent lighting and a collection of screens displaying an array of information from global news to maps highlighting real-time cyberattacks.
How Trustwave Keeps an Eye on Hackers
Look inside the Loop command center where the information-security company is stepping up its cybersecurity game.