With 30 years of work experience in the channel, Trustwave’s Suzanne Swanson says her biggest business strength today continues to be her hands-on involvement working with partners.
CrackQ Tool Adds Analysis and Reports to Password Cracking
There is a new tool offensive security teams can use for their password cracking needs. CrackQ is open-source and can provide metrics on the current jobs, queuing and re-queuing tasks.
SatLink VSAT Modem Vulnerabilities Open Door to Cross-site Scripting Attacks
Security researchers have divulged two vulnerabilities in the SatLink 2000 VSAT modem that could enable hackers to carry out cross-site scripting attacks and sniff sensitive data traversing the modem.
Fake Windows 10 ‘Update’ Is Actually Just Filled With Ransomware
It’s no secret that Microsoft’s Windows 10 updates have been controversial as of late. They’ve been filled with patches fixing previous updates’ bugs only to create more issues. Now, there’s a whole new problem altogether: Fake ransomware-filled updates.
Windows Users Beware: This Fake Update Could Lock Up Your PC
With the end of support for Windows 7 coming in January, many users are looking to update to Windows 10 to continue getting security updates and support from Microsoft. According to a report from security firm Trustwave, attackers are well aware of this and targeting Microsoft users with fake update emails.
Trustwave Launches Advanced Threat Detection for Azure
For Microsoft Azure users, Trustwave is launching new services to bolster threat monitoring, detection and response natively on the platform.
To Secure Multicloud Environments First Acknowledge You Have a Problem
Multicloud environments change rapidly. Organizations need a security framework that is purpose-built for the cloud and that aligns with their digital transformation strategy.
Ransomware First Responder: ‘The Bad Guys are Getting Smarter’
Trustwave’s Shawn Kanady on the evolution of ransomware attacks, why the public sector appears to be taking the biggest hit, and whether organizations should pay the ransom.
Many Passwords Not Strong Enough Allowing Hackers to Access Your Accounts
You might think your password is strong but think again. Your passwords are at risk, even if they have special characters and numbers.
Microsoft Patch Tuesday Fixes 59 Flaws
Microsoft has issued its monthly security (Patch Tuesday) update, to fix a total of 59 vulnerabilities in its operating systems and products.
Experts Expect Hospital Ransomware Attacks to Continue
One week after being hit by a ransomware attack, hospitals in Alabama are turning away patients while working on recovery, and experts warn of similar attacks in the future.
Singtel’s Trustwave Sharpens Cloud Security Platform in Singapore
Trustwave has unveiled a new cloud native platform designed to offer enhanced cyber security products and managed services to Singaporean customers.
‘Chameleon’ Spam Campaign Employs Randomized Email Headers
A large number of spam messages recently sent from the same botnet were observed featuring randomized headers and even different templates, with some emails resembling phishing, Trustwave reports.
17 Cybersecurity Products the Cyber Insurance Industry Says Are Worthwhile
Insurance broker Marsh has unveiled the inaugural class of cybersecurity products and services receiving a Cyber Catalyst designation that is part of an evaluation program its backers hope will bring greater clarity in the crowded cybersecurity marketplace.
The Secret to Total Cyber Security
Good cyber-defense requires total visibility of the network to understand what could be a potential vulnerability. In cybersecurity, a network is only as strong as its weakest point. Chris Schueler, Trustwave’s Senior Vice President of Managed Security Services, shares more in an exclusive interview with GovInsider.
The Saudi Oil Attacks Could be a Precursor to Widespread Cyberwarfare for Companies in the Region
The Kingdom and oil and gas industry have been slow to shore up defenses, raising red flags about the possibility of longer term fallout in the region, experts said, including those who have responded to incidents in the region.
Think Outside the Box to Close the Skills Gap
The right people are out there. It’s just a matter of finding them. I talked to Chris Schueler, SVP of Managed Security Services at Trustwave, for advice on how companies can start thinking outside the box about hiring cybersecurity staff and how to best identify potential candidates who may not meet your current criteria but could end up being the right person for the job.
Top Wi-Fi Routers Have Major Security Flaws
A security researcher from Trustwave has discovered vulnerabilities in several D-Link and Comba routers which could make it easy for cybercriminals to see usernames and passwords stored on the devices.
D-Link Wireless Modems Found to Leak Passwords
Trustwave's Spiderlabs has uncovered credential leaking vulnerabilities in D-Link wireless ADSL2+ modem routers that are widely available in Australia.
Automation: Friend of the SOC Analyst
Faced by increasingly sophisticated threats, organizations are realizing the benefits of automation in their cybersecurity programs. Automation, artificial intelligence (AI), and machine learning (ML) are rapidly transforming nearly every industry, and cybersecurity is no exception.
Cybersecurity Readiness: A Must-Have For Digital Transformation Success
Enterprises today are facing challenges that are forcing them to embrace new technologies and applications that drive decision-making strategies based on hard data and real-time situational analysis and rely less on pure gut instincts.
Grupo Tecno Strengthens its Offer with Trustwave Managed Security Services
Trustwave, provider of cybersecurity services, and Grupo Tecno, integrator of Information Technology, signed an agreement that aims to provide managed cybersecurity services to both private and public companies in Mexico and Latin America.
Moving on Up: Ready for Your Apps to Live in the Cloud?
As the digital landscape changes, organizations are doing some purging of their own as they move to the cloud. But that transition isn't as easy as packing up dishes and linens, putting boxes on a truck, and heading off to a new destination.
#BHUSA: Increase Social Media Awareness with Active and Passive Testing
Speaking on “Testing Your Organization's Social Media Awareness” at Black Hat USA, Jacob Wilkin, network penetration tester and application security consultant, Trustwave SpiderLabs, said that social media phishing is on the rise and is now the “preferred vector for attackers” who now spread more malware via social media than on email.
AttackSurfaceMapper Automates the Reconnaissance Process
AttackSurfaceMapper, a new open source OSINT tool created by Andreas Georgiou and Jacob Wilkin, security consultants at Trustwave SpiderLabs, automates the process of collecting data that can help pentesters find a way into targets’ systems and networks.
Cybersecurity Staffers Needed No Experience Required
The industry-wide shortage of trained cybersecurity personnel is not a new story, but Trustwave has begun to take a new approach to find not only trained cybersecurity staffers, but also those with no training or computer skills at all.
SanDisk’s SDD Dashboard Used Hardcoded Password Lacks Encrypted Updates
Lackadaisical security practices in proprietary management software from a hardware vendor underscore the need for a vendor-agnostic solution.
Crain’s Hosts Tech 50 Event
Crain’s Chicago Business hosted its Tech 50 event honoring its annual list of headliners, behind-the-scenes heroes, new faces and emerging stars of Chicago tech. More than 100 people attended the event at cybersecurity company Trustwave’s office in the loop.
Snake Bites and Data Breaches
Why is treating a snake bite like responding to a data breach? It might sound like the beginning of a cheesy joke, but the two can have more in common that you might expect.
Cybersecurity Skills Shortage Prompts New Hiring Approach
Hiring managers are widening the pool of candidates in response to the cybersecurity skills shortage. Learn how a parks and recreation background can be an asset in threat hunting.