Three steps to secure an organization during mergers and acquisitions

Since 2000, there have been over 790,000 merger and acquisition (M&A) transactions announced globally, consisting of a value over 57 trillion dollars. While these expansions and transitions create great business opportunity, they also present a un… Continue reading Three steps to secure an organization during mergers and acquisitions

Palo Alto Networks Cortex XMDR Specialization empowers customers’ security operations

Palo Alto Networks announced its Cortex eXtended Managed Detection and Response (XMDR) Partner Specialization to help customers detect, investigate and respond to cyberthreats across endpoint, network and cloud assets. Building on the demand for Palo A… Continue reading Palo Alto Networks Cortex XMDR Specialization empowers customers’ security operations

Secure your databases against opportunistic attackers

If you connect databases / servers to the internet and secure them poorly, you can count on them getting compromised quickly. According to findings by Radoslaw Zdonczyk, Security Researcher at Trustwave SpiderLabs, there will be login attempts even bef… Continue reading Secure your databases against opportunistic attackers

Trustwave partners with CISA and joins CISCP to help strengthen U.S. cybersecurity resiliency

Trustwave Government Solutions announced it has joined the Cybersecurity and Infrastructure Security Agency (CISA) Cyber Information Sharing and Collaboration Program (CISCP). The overall mission of CISCP is to build cybersecurity resiliency and to har… Continue reading Trustwave partners with CISA and joins CISCP to help strengthen U.S. cybersecurity resiliency

Trustwave expands senior leadership team with two new appointments

Trustwave announced the appointment of two new members to its senior leadership team. Spencer Ingram, senior vice president, operations, will drive strategy for customer experience and systems and processes that support the overall global business. Spe… Continue reading Trustwave expands senior leadership team with two new appointments

How do I select a managed cybersecurity solution for my business?

Digital transformation has been around for a while, but last year it accelerated its pace significantly. As organizations suddenly shifted to an almost exclusively digital world, the need to protect digital assets grew even more. One way to tackle thes… Continue reading How do I select a managed cybersecurity solution for my business?

Pingback: ICMP Tunneling Malware

By Keith Jones, Anthony Kasza and Ben Reardon, Security Researchers, Corelight Introduction Recently, Trustwave reported on a new malware family which they discovered during a breach investigation. The backdoor, dubbed Pingback, executes on Windows sys… Continue reading Pingback: ICMP Tunneling Malware

Office 365 phishing campaign uses publicly hosted JavaScript code

A new phishing campaign targeting Office 365 users cleverly tries to bypass email security protections by combining chunks of HTML code delivered via publicly hosted JavaScript code. The phishing email and page The subject of the phishing email says &#… Continue reading Office 365 phishing campaign uses publicly hosted JavaScript code

How do I select an attack detection solution for my business?

Around the world, organizations are facing a tremendous increase in cyber risk. A recent research reveals that 31% of companies now experience a cyberattack at least once a day, a trend that’s expected to skyrocket as cybercriminals employ AI and autom… Continue reading How do I select an attack detection solution for my business?

SolarWinds Orion exploited by another group of state-sponsored hackers

Another group of state-sponsored hackers has exploited the ubiquity of SolarWinds software to target US government agencies, Reuters reported on Tuesday. State-sponsored hackers have a taste for SolarWinds? Unlike the alleged Russian attackers who inse… Continue reading SolarWinds Orion exploited by another group of state-sponsored hackers