Conficker: A 10-year retrospective on a legendary worm

This November marked the 10-year anniversary of Conficker, a fast-spreading worm targeting Microsoft systems that went on to claim one of the highest levels of infection in history. Millions of computers were eventually infected by the worm, including … Continue reading Conficker: A 10-year retrospective on a legendary worm

Make-A-Wish website compromised to serve cryptojacking script

Visitors of the international website of the US-based non-profit Make-A-Wish Foundation have had their computing power misused to covertly mine cryptocurrency, Trustwave researchers have found. The compromise In-browser cryptomining is not illegal and … Continue reading Make-A-Wish website compromised to serve cryptojacking script

Five key considerations when developing a Security Operations Center

Ensuring access to a reliable feed of threat intelligence through a security operations center (SOC) is an essential element of many organization’s security strategy today. However, establishing a SOC is a complicated endeavour, particularly when it co… Continue reading Five key considerations when developing a Security Operations Center

Social Mapper: A free tool for automated discovery of targets’ social media accounts

Trustwave has released Social Mapper, an open source tool that automates the process of discovering individuals’ social media accounts. How Social Mapper works The tool takes advantage of facial recognition technology and searches for targets&#82… Continue reading Social Mapper: A free tool for automated discovery of targets’ social media accounts

Compromised MikroTik routers power extensive cryptojacking campaign

A massive cryptojacking campaign that relies on compromised MikroTik routers serves users with pages injected with the Coinhive mining script. It seems that the attacker initially mainly focused on compromising devices located in Brazil but devices in … Continue reading Compromised MikroTik routers power extensive cryptojacking campaign

Overview: Microsoft June 2018 Patch Tuesday

It’s that time of the month again when Microsoft releases patches for its software. The June 2018 updates fix 50 vulnerabilities, 12 of which are critical. The company has also detailed the vulnerabilities patched by Adobe and delivered via Micro… Continue reading Overview: Microsoft June 2018 Patch Tuesday

Pressures impacting security pros are up, threats are turning up the heat

Trustwave released the 2018 Security Pressures Report based on a global survey of 1,600 full-time IT professionals who are security decision makers or security influencers within their organization. Findings show that a majority of IT and cybersecurity… Continue reading Pressures impacting security pros are up, threats are turning up the heat

Cyber attacks are becoming more organized and structured

Trustwave released the 2018 Trustwave Global Security Report which reveals the top security threats, breaches by industry, and cybercrime trends from 2017. The report is derived from the analysis of billions of logged security and compromise events wor… Continue reading Cyber attacks are becoming more organized and structured