Trustwave partners with Trellix to improve detection and response for security teams

Trustwave and Trellix have formed a strategic partnership to bring visibility and more precise detection and response to security teams defending against cyberthreats. Trustwave’s Managed Detection and Response (MDR) provides enterprises across the glo… Continue reading Trustwave partners with Trellix to improve detection and response for security teams

Microsoft to boost protection against malicious OneNote documents

Microsoft has announced that, starting in April 2023, they will be adding enhanced protection when users open or download a file embedded in a OneNote document – a known high-risk phishing file type. “Users will receive a notification when … Continue reading Microsoft to boost protection against malicious OneNote documents

Potential threats and sinister implications of ChatGPT

ChatGPT from OpenAI is a conversational chatbot recently released in preview mode for research purposes. It takes natural language as input and aims to solve problems, provide follow-up questions or even challenge assertions depending on your question…. Continue reading Potential threats and sinister implications of ChatGPT

Trustwave Enterprise Pen Testing allows enterprises to proactively identify known and unknown threats

Trustwave announced its new Enterprise Pen Testing (EPT) offering, designed to meet the complex testing needs of large organizations with an extensive breadth and depth of vulnerability identification, ability to deliver scaled programs of work, and ex… Continue reading Trustwave Enterprise Pen Testing allows enterprises to proactively identify known and unknown threats

7 critical steps to defend the healthcare sector against cyber threats

While knowing full well that human lives may be at stake, criminal gangs have been increasingly targeting the healthcare sector with high-impact attacks like ransomware. 1. Tighten up email security Healthcare providers should set up numerous layers of… Continue reading 7 critical steps to defend the healthcare sector against cyber threats

How bad actors are utilizing the InterPlanetary File Systems (IPFS)

With the continued rise in adoption of cloud services, bad actors are utilizing the InterPlanetary File System (IPFS) as a new playing ground for phishing attacks. In fact, Trustwave SpiderLabs has found that in the past 90 days, more than 3,000 emails… Continue reading How bad actors are utilizing the InterPlanetary File Systems (IPFS)

How to avoid headaches when publishing a CVE

You have discovered a vulnerability. Congratulations! So, what happens next? Finding a CVE (Common Vulnerabilities and Exposures) is the first step in a process which starts with the identification of a zero-day and could end with fame and glory – if t… Continue reading How to avoid headaches when publishing a CVE

Three steps to secure an organization during mergers and acquisitions

Since 2000, there have been over 790,000 merger and acquisition (M&A) transactions announced globally, consisting of a value over 57 trillion dollars. While these expansions and transitions create great business opportunity, they also present a un… Continue reading Three steps to secure an organization during mergers and acquisitions