Date | Title | Description | Source |
04.04.2024 | Trellix launches new AI-powered zero-trust solution for enha... | Cybersecurity company Trellix today announced a zero-trust solution that provides native monitoring,... | siliconang... |
27.03.2024 | Phishing Campaign: Researchers Discover 'Agent Tesla' Keylog... | Joseph Henry, Tech Times 27 March 2024, 09:03 am
A recent phishing campaign has surfaced, deploying ... | techtimes.... |
22.01.2024 | ТОП-5 ИБ-событий недели по версии Jet CSIRT... | Сегодня в ТОП-5 — RCE-уязвимость vCenter Server, уязвимость межсетевых экранов SonicWall к DoS- и RC... | habr.com/r... |
17.01.2024 | Плохой-хороший ИИ: как алгоритмы помогают хакерам и специали... | Компании активно используют ИИ-системы и чат-ботов в рабочих процессах, например, для создания регул... | habr.com/r... |
06.12.2023 | Only 19 percent of manufacturing leaders are confident of th... | New research into the manufacturing threat landscape from Trustwave finds that just 19 percent of ma... | betanews.c... |
26.09.2023 | AI needs human insight to reach its full potential against c... | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Netwo... | venturebea... |
26.06.2023 | Anonymous Sudan’s Attack of European Investment Bank: Money,... | Image: Adobe Stock/Sandsun
Last week, Anonymous Sudan, identified by Flashpoint and others as a Russ... | techrepubl... |
13.06.2023 | Trustwave report finds attacks targeting Microsoft’s MS SQL ... | A new report from cybersecurity company Trustwave Holdings Inc. has found that attacks targeting Mic... | siliconang... |
13.05.2023 | Data: The once coveted resource that has become tricky to ex... | Traditionally, oil has been the metaphor of choice when discussing the value of data. Like oil, data... | betanews.c... |
07.04.2023 | More phishing campaigns are using IPFS network protocol | Image: Adobe Stock
The fraudulent use of the InterPlanetary File System seems to have increased rece... | techrepubl... |
06.04.2023 | DDoS attacks rise as pro-Russia groups attack Finland, Israe... | Image: Golden Sikorka/Adobe Stock
The pro-Russia hacker group NoName057(16) reportedly claimed it wa... | techrepubl... |
23.03.2023 | Trustwave Supports United States Patent and Trademark Office... | Trustwave Government Solutions (TGS), a Federally-focused cybersecurity provider and the wholly-owne... | aithority.... |
11.03.2023 | Microsoft улучшит защиту от фишинговых атак через файлы в On... | Microsoft представит улучшенную защиту от фишинговых атак, распространяющих вредоносное ПО через фай... | habr.com/r... |
05.03.2023 | Trustwave Government Solutions Achieves Palo Alto Networks C... | Trustwave Government Solutions (TGS), a Federally focused Managed Detection and Response (MDR) provi... | aithority.... |
09.02.2023 | HTML smuggling -- the latest way to to deliver malware | Since Microsoft began the default blocking of macros in documents sent over the internet there's bee... | betanews.c... |
01.02.2023 | OneNote documents spread malware in several countries | Image: Sashkin/Adobe Stock
As Microsoft decided to change the default of its Office products to bloc... | techrepubl... |
27.01.2023 | Trustwave updates its threat hunting to find unknown dangers | Threat hunting takes a proactive approach to identifying the security issues an organization might f... | betanews.c... |
18.01.2023 | Trustwave Relaunches Advanced Continual Threat Hunt with a U... | Trustwave, a leading cybersecurity and managed security services provider, relaunched its Advanced C... | aithority.... |
13.12.2022 | Business email compromise attacks now targeting people via S... | Image: panuwat/Adobe Stock
A business email compromise attack is a type of scam aimed at an organiza... | techrepubl... |
01.12.2022 | Phishing for likes: How cybercriminals are exploiting Instag... | For anyone invested in social media, copyright infringement is a big deal. Users must be able to pro... | betanews.c... |
07.10.2022 | Outlook forwarding rule can bypass corporate blocks, say res... | Microsoft Outlook Desktop has an unpatched vulnerability that would allow a successful attacker to c... | itnews.com... |
25.08.2022 | Log4Shell still being exploited six months on | Six months after the Log4Shell vulnerability was made known, vulnerable instances remain accessible ... | betanews.c... |
23.08.2022 | Poor healthcare cybersecurity is a threat to public health | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand libr... | venturebea... |
18.08.2022 | Pssstt... Wanna buy an identity? The price of data on the da... | We all know that stolen information is traded on the dark web, and new research by Trustwave looks a... | betanews.c... |
19.07.2022 | Email Scams Are Getting More Personal – They Even Fool Cyber... | If an email is setting off alarm bells, check the sender’s details. Shutterstock | techfinanc... |
29.06.2022 | Мошенники крадут учетные данные пользователей Facebook**, пр... | Фишинговую атаку обнаружила компания TrustWave. Злоумышленники используют чат-бота Facebook**, чтобы... | habr.com/r... |
20.06.2022 | Trustwave's new MDR solutions improve detection and response... | New managed detection and response (MDR) offerings launched by Trustwave aim to give organizations r... | betanews.c... |
10.06.2022 | It’s Time For The C-Suite To Protect Themselves Against Cybe... | James Legg, President, Delinea | forbes.com... |
23.05.2022 | New phishing technique lures users with fake chatbot | Image: Gstudio/Adobe Stock
A new report from Trustwave exposes an emerging phishing technique used b... | techrepubl... |
25.03.2022 | New Windows spyware campaign can get you in a click | You might want to be a little bit more careful when clicking any attachments sent to you via email, ... | digitaltre... |
16.03.2022 | Chameleon phishing attack brings bad karma to email users | New research by Trustwave SpiderLabs has uncovered a phishing attack that is able to adapt itself to... | betanews.c... |
08.03.2022 | IPFS phishing on the rise, makes campaign takedown more comp... | Image: Adobe Stock
To successfully run a phishing operation, cybercriminals do generally need to hos... | techrepubl... |
28.02.2022 | How enterprises can boost security with vulnerability manage... | Cyberattacks come in many different forms and it’s important for businesses to understand where they... | betanews.c... |
21.02.2022 | МВД раскрыло детали ареста членов третьей группировки хакеро... | 21 февраля 2022 года МВД РФ раскрыло подробности задержания и ареста 7 февраля шестерых членов хакер... | habr.com/r... |
16.02.2022 | СМИ: предполагаемый основатель The Infraud Organization приз... | По информации «Интерфакс», предполагаемый основатель The Infraud Organization Андрей Новак полностью... | habr.com/r... |
14.02.2022 | Hacking group is on a tear, hitting US critical infrastructu... | Enlarge
Getty Images reader comments 56 with 40 posters participating, including story author
Share ... | arstechnic... |
14.02.2022 | Hacking group is on a tear, hitting US critical infrastructu... | Enlarge
Getty Images reader comments 48 with 34 posters participating, including story author
Share ... | arstechnic... |
25.01.2022 | СМИ: задержанные члены The Infraud Organization заключили до... | По информации «ТАСС», некоторые задержанные члены хакерской группировки The Infraud Organization зак... | habr.com/r... |
24.01.2022 | REvil gang member arrests strike fear among cybercriminals o... | Image: Wetzkaz Graphics/Shutterstock
Many cybercriminals seem to operate with little fear of reprisa... | techrepubl... |
23.12.2021 | Crypto fraud, ransomware-as-a-service and deepfakes -- cyber... | Cybercrime has increasingly become a feature of the modern world and its perpetrators are getting ev... | betanews.c... |
23.12.2021 | Zero trust, democratization and biometrics -- identity manag... | Zero trust has been one of the security buzz phrases of the past year and control of identity and cr... | betanews.c... |
09.12.2021 | 300,000 MikroTik routers are ticking security time bombs, re... | Enlarge
Getty Images reader comments 105 with 69 posters participating
Share this story
Share on Fac... | arstechnic... |
09.12.2021 | 300,000 MikroTik routers are ticking security time bombs, re... | Enlarge
Getty Images reader comments 89 with 59 posters participating
Share this story
Share on Face... | arstechnic... |
08.12.2021 | Trustwave Managed Vendor Risk Assessment (MVRA) Launches Glo... | Trustwave, a leading managed security services provider focused on managed detection and response, t... | marketscre... |
29.09.2021 | Coalition raises mega round to tackle spiking cyber attacks | The news: The US-based cyber insurance and security company secured a $205 million Series E round at... | emarketer.... |
29.09.2021 | Why organizations are slow to patch even high-profile vulner... | Image: iStock/weerapatkiatdumrong Must-read security coverage
Best encryption software 2022
The 10 b... | techrepubl... |
19.08.2021 | Threat Thursday: TA575/Dridex | Threat Thursday: TA575/Dridex
RESEARCH & INTELLIGENCE / 08.19.21 / The BlackBerry Research &... | marketscre... |
09.08.2021 | Из-за багов в Telegram для Mac можно навсегда сохранять само... | Александра Кукуть 9 августа 2021, 12:07 Из-за багов в Telegram для Mac можно навсегда сохранять само... | dev.by/new... |
05.08.2021 | Trustwave : Launches First-of-Its-Kind Cyber Supply Chain Ri... | Trustwave, a leading managed security services provider focused on managed detection and response, h... | marketscre... |
05.08.2021 | Trustwave Launches First-of-Its-Kind Cyber Supply Chain Risk... | In The Face of Increased Concern About Vendor Cybersecurity Risk, Company Behind SolarWinds Vulnerab... | aithority.... |
26.07.2021 | What to do after a ransomware attack [Q&A] | Ransomware is a major problem and ideally while you'd like to avoid being attacked, the chances are ... | betanews.c... |
20.07.2021 | What’s the consensus on the state of web app security, anywa... | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
20.07.2021 | What’s the consensus on the state of web app security, anywa... | All the sessions from Transform 2021 are available on-demand now. Watch now.
“Every company is now a... | venturebea... |
09.07.2021 | Kaseya VSA contained multiple vulnerabilities | The Kaseya Virtual Systems Administration (VSA) remote management and monitoring system software tha... | itnews.com... |
17.06.2021 | Five percent of VPN solutions remain unpatched and vulnerabl... | In 2020 we saw a huge shift to remote working, with VPN often the technology of choice for keeping c... | betanews.c... |
10.05.2021 | The normalization of data leaks and the privacy paradox [Q&a... | Is society becoming too accepting of data breaches? Do we claim to want more privacy but then contin... | betanews.c... |
06.05.2021 | Hints and tips for World Password Day | Today is World Password Day, in case you hadn't already noticed, a day to promote better password ma... | betanews.c... |
29.03.2021 | “An army of clones is a predictable foe”: The importance of ... | Source: Unsplash/Jefferson Santos.
What if the current handwringing around a cyber skills shortage w... | smartcompa... |
02.03.2021 | EXTREME NETWORKS, INC.
Network Segmentation Health Check: O... | ZDnet reports, Ransomware attacks are now to blame for half of healthcare data breaches. Back in Oct... | marketscre... |
19.02.2021 | Securing the Future: Cybersecurity Predictions for 2021 | Predictions are always a risky business. Anyone writing this post a year ago could not have seen wha... | readwrite.... |
15.02.2021 | Notion’s hours-long outage was caused by phishing complaints... | Last week’s hours-long outage at online workspace startup Notion was caused by phishing complaints, ... | techcrunch... |
04.02.2021 | SolarWinds patches vulnerabilities that could allow full sys... | Enlarge
Getty Images reader comments 24 with 18 posters participating
Share this story
Share on Face... | arstechnic... |
01.02.2021 | 5 Lasting Changes To Expect In The Workplace Post-Covid | getty | forbes.com... |
14.01.2021 | Why testing is vital to securing modern enterprises [Q&A... | Security testing has gained in visibility in recent years and can undoubtedly help improve the secur... | betanews.c... |
19.11.2020 | Messaging app Go SMS Pro exposed millions of users’ private ... | Go SMS Pro, one of the most popular messaging apps for Android, is exposing photos, videos and other... | techcrunch... |
12.11.2020 | How China’s Control of Information is a Cyber Weakness | In 2015, news broke that Chinese hackers had breached computer networks at the U.S. Office of Person... | lawfareblo... |
22.10.2020 | A cybersecurity firm found a hacker selling personal data on... | A cybersecurity company has found a hacker offering to sell data about the political affiliations of... | businessin... |
21.10.2020 | Hybrid cloud is driving digital transformation | The hybrid cloud model is increasingly used in digital transformation and data storage according to ... | betanews.c... |
02.10.2020 | How fear, uncertainty and doubt are employed to sell cyber s... | Hivint co-founders Craig Searle and Nick Ellsmore (L to R). Hivint was sold to Optus company Trustwa... | smartcompa... |
28.09.2020 | The challenges of hybrid cloud adoption [Q&A] | Cloud is used for all kinds data processing nowadays, but there are still some things that need to b... | betanews.c... |
14.08.2020 | Threat Detection And Response Company Blumira Closes $2.6 Mi... | Ann Arbor, Michigan-based cybersecurity company Blumira announced recently that it raised $2.6 milli... | pulse2.com... |
17.07.2020 | Managed Detection and Response (MDR) GoSecure Raises $20 Mil... | GoSecure — an established leader in the rapidly-growing Managed Detection and Response (MDR) market ... | pulse2.com... |
14.07.2020 | Malware stashed in China-mandated software is more extensive... | Pixy reader comments 102 with 54 posters participating, including story author
Share this story
Shar... | arstechnic... |
02.07.2020 | Mandatory Chinese tax app updates to remove backdoor | The saga of the Chinese bank-mandated Aisino Intelligent Tax software that installed a remote access... | itnews.com... |
01.07.2020 | The Cyberlaw Podcast: Bill Barr Crosses the Rubicon | For the first time in twenty years, the Justice Department is finally free to campaign for the encry... | lawfareblo... |
26.06.2020 | Chinese bank requires foreign firm to install app with cover... | Enlarge
Jeremy Brooks / Flickr reader comments 148 with 104 posters participating
Share this story
S... | arstechnic... |
19.05.2020 | How the dark web is handling the coronavirus pandemic | https://d1rytvr7gmk1sx.cloudfront.net/wp-content/uploads/2019/04/20190328_Wilson_DarkWeb_Dan_TR.mp4
... | techrepubl... |
19.05.2020 | Dark Web scams seek to cash in on COVID-19 | With cybercriminals ever keen to exploit the latest trends to their advantage, it should come as no ... | betanews.c... |
29.04.2020 | Working from home | Caesar Tonkin, Logicalis SA CISO.
During the country-wide lockdown, effective from 26 March 2020, in... | itweb.co.z... |
23.04.2020 | New platform allows sharing of cybersecurity resources | The ever changing landscape of cybersecurity means it can be hard for any one organization to stay o... | betanews.c... |
22.04.2020 | Cybercriminals focus on social engineering as other attacks ... | The latest Global Security Report from Trustwave, based on analysis of more than a trillion logged e... | betanews.c... |
22.04.2020 | How to better protect your organization against email threat... | https://d1rytvr7gmk1sx.cloudfront.net/wp-content/uploads/2019/11/20191119-Boyer-Karen.mp4
Cybercrimi... | techrepubl... |
15.04.2020 | Scammers exploit coronavirus for Business Email Compromise c... | https://d1rytvr7gmk1sx.cloudfront.net/wp-content/uploads/2019/11/20191119-Boyer-Karen.mp4 Must-read ... | techrepubl... |
26.03.2020 | Gift card scam sends out malicious USB drives | Malware attacks using USB flash drives dropped in offices or public locations like car parks are not... | betanews.c... |
12.03.2020 | Cyber Attackers Are Exploiting Coronavirus Fears | Recently, Paul Rosenzweig shared his experiences as a government employee in the George W. Bush admi... | lawfareblo... |
23.12.2019 | Security concerns and the benefits of 5G -- IoT and edge pre... | Internet of Things devices are now an accepted part of our home and business lives. They've led to i... | betanews.c... |
04.12.2019 | New tool helps in the fight against weak passwords | Poor passwords frequently provide hackers with a way into networks. In order to help security teams ... | betanews.c... |
05.11.2019 | Trustwave launches advanced threat detection for Azure | As increasing numbers of businesses shift to cloud and multi-cloud environments, securing systems be... | betanews.c... |
11.09.2019 | D-Link and Comba routers have multiple vulnerabilities, incl... | A security researcher has revealed details of a series of vulnerabilities in routers made by D-Link ... | betanews.c... |
19.06.2019 | Managed Detection and Response Company CRITICALSTART Secures... | CRITICALSTART announced that it has secured a sizeable $40 million minority investment from growth e... | pulse2.com... |
14.06.2019 | Threat Detection And Response Company Vectra Closes $100 Mil... | Vectra, a leading company in the network threat detection and response (NDR) industry, announced it ... | pulse2.com... |
25.04.2019 | Email threats become more focused and malware gets harder to... | Spam emails containing malware significantly dropped in 2018, to just six percent, down from 26 perc... | betanews.c... |
13.01.2019 | Responsible IoT: How to keep your office safe from botnet at... | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
13.01.2019 | Responsible IoT: How to keep your office safe from botnet at... | How many smart devices are connected to your company’s network right now? I once tried to figure out... | venturebea... |
20.11.2018 | Make a Wish Site Hit by Crypto Mining Malware Hack | Crypto mining is becoming less profitable by the minute as the price of crypto tanks and the cost to... | crowdfundi... |
08.11.2018 | Dropbox partners with Google Cloud Identity for advanced sec... | Security is top of mind for most enterprises, and not without good reason. In 2017, there were appro... | venturebea... |
08.11.2018 | Dropbox partners with Google Cloud Identity for advanced sec... | Did you miss a session from GamesBeat Summit 2022? All sessions are available to stream now. Learn m... | venturebea... |
12.09.2018 | Inside Trustwave's New Chicago Cybersecurity Command Center | Right now, in a dark cybersecurity command center in downtown Chicago, hackers and researchers are w... | bizjournal... |
05.09.2018 | Unpatched routers being used to build vast proxy army, spy o... | Enlarge
Dirk Hoffmann / EyeEm/Getty Images reader comments 86 with 54 posters participating, includi... | arstechnic... |
08.08.2018 | Facial recognition tool helps penetration testing | Using fake social media profiles is a common technique among hackers in order to gain the confidence... | betanews.c... |