AttackSurfaceMapper automates the reconnaissance process

AttackSurfaceMapper, a new open source OSINT tool created by Andreas Georgiou and Jacob Wilkin, security consultants at Trustwave SpiderLabs, automates the process of collecting data that can help pentesters find a way into targets’ systems and n… Continue reading AttackSurfaceMapper automates the reconnaissance process

Data: E-Retail Hacks More Lucrative Than Ever

For many years and until quite recently, credit card data stolen from online merchants has been worth far less in the cybercrime underground than cards pilfered from hacked brick-and-mortar stores. But new data suggests that over the past year, the economics of supply-and-demand have helped to double the average price fetched by card-not-present data, meaning cybercrooks now have far more incentive than ever to target e-commerce stores. Continue reading Data: E-Retail Hacks More Lucrative Than Ever

Cybercriminals are becoming more methodical and adaptive

Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations improve in areas such as time to detection and response to threats, according to… Continue reading Cybercriminals are becoming more methodical and adaptive

Hackers turn Bangladeshi embassy website into cryptomining scheme

The websites of foreign embassies are often where people go to download visa applications and other documents They are also ripe openings for embedding malware. Criminal hackers have taken notice. In the case of the Bangladesh Embassy in Cairo, attackers appear to be using the website to mine cryptocurrency, according to research published Wednesday by SpiderLabs, the security team of Chicago-based company Trustwave. Almost the entire embassy website appears to be compromised, with nearly every attempt to access a URL ending in a request to save a malicious file, the researchers said. Only three of 69 antivirus engines detected the infected website as malicious. “This level of compromise usually indicates the attacker’s ability to not only upload their own data, but also change the web server’s configuration,” SpiderLabs’ Nikita Kazymirskyi wrote in a blog post. The hackers appear to have breached the website in October. In January, SpiderLabs noticed a Microsoft Word […]

The post Hackers turn Bangladeshi embassy website into cryptomining scheme appeared first on CyberScoop.

Continue reading Hackers turn Bangladeshi embassy website into cryptomining scheme

Trustwave partners with Cybereason to strengthen MDR for Endpoints

Trustwave announced a strategic alliance with Cybereason to further strengthen Trustwave Managed Detection and Response (MDR) for Endpoints, a comprehensive managed security service designed to protect organizations against advanced endpoint threats. T… Continue reading Trustwave partners with Cybereason to strengthen MDR for Endpoints

Security Product Launches, and Announcements – Enterprise Security Weekly #122

– Commvault Enables Any Application And Any Cloud At Scale With Snapshot-assisted Backups – today announced that its IntelliSnap snapshot technology has been tested and validated to work with Cisco HyperFlex hyperconverged systems to protec… Continue reading Security Product Launches, and Announcements – Enterprise Security Weekly #122