Trustwave SpiderLabs researchers identify a new email scam that applies a number of crafty techniques to bypass security filters and infect victims with NanoCore malware.
More exploitable flaws found in SolarWinds software says cybersecurity firm
Ziv Mador, VP of Security Research, discusses the importance of the three new and severe vulnerabilities in SolarWinds products found by Trustwave and the need for organizations to implement a strong penetration testing strategy.
‘Severe’ SolarWinds Vulnerabilities Allow Hackers To Take Over Servers
Forbes details the latest SolarWinds product vulnerabilities discovered by Trustwave and protection recommendations.
4 ways to minimize the risk of IT supply chain attacks
Mark Whitehead, Global Vice President, SpiderLabs Consulting at Trustwave breaks down the importance of taking a zero-trust cybersecurity approach when it comes to protecting networks and data accessible by third-party partners.
This new phishing attack uses an odd lure to deliver Windows trojan malware
Trustwave discovered a new phishing campaign that attempts to lure victims into downloading malware that gives cybercriminals full control over infected Microsoft Windows machines.
Multiple security flaws let hackers infiltrate D-Link routers
Five major vulnerabilities have been discovered affecting D-Link routers by cybersecurity researchers working as part of Trustwave’s SpiderLabs team.
Security Automation: Time for a new playbook
Jesse Emerson, VP of Managed Security Services at Trustwave talks security automation in the cloud and IoT era.
Trustwave’s Bill Rucker: Agencies Need Unified Platform to Ensure Security of Mission-Critical Data
Bill Rucker, president of Trustwave Government Solutions discusses security in cloud and on-prem environments and the importance of unified platforms.
Hackers can use WinZip insecure server connection to drop malware
Trustwave SpiderLabs discovers a security vulnerability in WinZip 24 that could lead to a malware infection.
What's in Store for Privacy in 2021
Changes are coming to the privacy landscape, including more regulations and technologies.
Messaging app Go SMS Pro exposed millions of users’ private photos and files
Go SMS Pro, one of the most popular messaging apps for Android, is exposing photos, videos and other files sent privately by its users.
This messaging app uploads every file you send to the internet which is bad
Messaging app Go SMS Pro, which has over 100 million installs from the Google Play store, has a massive security flaw that potentially allows people to access the sensitive content you’ve sent using the app.
Encryption Vulnerabilities Allow Hackers to Take Control of Schneider Electric PLCs
A total of four vulnerabilities were discovered in Modicon M221 PLCs by researchers at industrial cybersecurity firm Claroty. Three of them were identified independently by employees of cybersecurity company Trustwave.
Survey: Cybersecurity Skills Shortage is ‘Bad’ But There’s Hope
Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap, according to a recent survey from Trustwave.
Cybersecurity Company Finds Hacker Selling Info on 186 Million U.S. Voters
A cybersecurity company says it has found a hacker selling personally identifying information of more than 200 million Americans, including the voter registration data of 186 million.
Iran and Russia Seek to Influence Election in Final Days U.S Officials Warn
Iran and Russia have both obtained American voter registration data, top national security officials announced late on Wednesday, providing the first concrete evidence that the two countries are stepping in to try to influence the presidential election as it enters its final two weeks.
Hybrid Cloud is Driving Digital Transformation
The hybrid cloud model is increasingly used in digital transformation and data storage according to a new report from Trustwave. Of over 950 IT professionals surveyed, 55 percent use both on-premises and public cloud to store data with 17 percent using public cloud only.
Open Source Threat Intelligence Searches for Sustainable Communities
As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down ...
Spammers Add Random Text to Shortened Links to Evade Detection
Spammers are using a new technique of generating URLs to evade detection by humans and spam filters alike. This technique comprises adding random, unused text bits to shortened links, to disguise them as full-sized URLs and bypass the scrutiny of email gateways.
Spammers Use Hexadecimal IP Addresses To Evade Detection
A spam group has picked up a pretty clever trick that has allowed it to bypass email filters and security systems and land in more inboxes than usual. The trick relies on a quirk in RFC791 — a standard that describes the Internet Protocol (IP).
Trustwave Fusion Platform Launches on AWS GovCloud
Threat detection and response services provider Trustwave has launched its Trustwave Fusion platform on Amazon Web Services GovCloud – letting Federal agencies and government contractors take advantage of the cloud-native cybersecurity platform to combat ever-changing security threats.
How a CISO’s Approach To Security Strategy Can Be Shaped by Philosophy
“Philosophy?” the conversation usually begins – “that’s an odd background for cybersecurity, isn’t it?” “Funnily enough,” comes my well-rehearsed reply, “not at all”. I have been surprised how often the skills of one field can be easily applied to the other.
Contactless Credit Card Popularity Soars During Pandemic but Stay Vigilant for Scammers
Contactless credit cards have become an extremely popular way to pay during the COVID-19 pandemic, according to industry experts. The technology allows you to wave your credit and debit cards over a device and pay without touching anything at the register. But consumers should still be vigilant for scammers.
Shared Memory Vulnerability in IBM's Db2 Database Could Let Nefarious Insiders Wreak Havoc
A bug-hunter has uncovered a vulnerability in IBM's popular enterprise database which, if left unpatched, could allow a local user to access data and kick off a denial-of-service attack.
Experts Reported Security Bug in IBM's Db2 Data Management Software
Cybersecurity researchers today disclosed details of a memory vulnerability in IBM's Db2 family of data management products that could potentially allow a local attacker to access sensitive data and even cause a denial of service attacks.
Businesses Opt to Outsource Cybersecurity Services
According to research, there is a lack of in-house expertise in the area of digital risk protection – the ability to monitor risks, threats and breaches outside the network. The research found 80% of respondents stated their teams lack skills and knowledge in this area.
Hackers Can Abuse Microsoft Teams Updater to Install Malware
Microsoft Teams can still double as a Living off the Land binary (LoLBin) and help attackers retrieve and execute malware from a remote location.
Microsoft Teams Vulnerable to Patch Workaround Researchers Report
Security researchers have discovered a way to use the Microsoft Teams Updater to download malware, bypassing a patch released earlier this year and flying under security teams' radar.
Chinese Tax Software Hides Nasty Spyware
The cybersecurity firm Trustwave has released a new report detailing its discovery of a new type of malware hidden inside Chinese tax software.
Cybersecurity Firm Finds More Malware Hidden in Chinese Tax Software
Analysts at cybersecurity firm Trustwave say they have discovered a new type of malware they say was embedded in sales tax software — a different, older malicious tool than the previous one they found.