Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Get to Know MXDR: A Managed Detection and Response Service for Microsoft Security

The Microsoft 365 E5 license gives users entitlements to numerous Microsoft Security products—so many, in fact, that as companies deploy the Microsoft Security suite, they may need a managed detection and response (MDR) service to get the most out of it. Enter Trustwave Managed Extended Detection and Response (MXDR) for Microsoft, an MDR service built specifically for Microsoft Security customers.

Phishing Campaign Abuses Windows Search to Distribute Malware

Researchers at Trustwave warn that a phishing campaign is distributing malware via HTML attachments disguised as invoices. Notably, the HTML files abuse the Windows Search protocol to launch Windows Explorer and trick users into installing the malware. “Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows search functionality embedded in HTML code to deploy malware,” the researchers state.

Microsoft and KnowBe4 Collaborate on Ribbon Phish Alert Button for Outlook

Increasing phishing attacks are a constant threat to organizations, making it crucial for users to report suspicious emails. This practice not only helps in identifying and mitigating potential threats, but also plays a significant role in educating and creating awareness among employees. The importance of reporting suspected phishing emails cannot be overstated, as it acts as a last line of defense against cyber threats.

Digital Operational Resilience Act (DORA) Part 2 - The Importance of Incident Response

The need for the Development of Online Reliable Sources (DORA) arises from the increasing concern over the spread of misinformation on the internet. DORA aims to promote fact-checking and address the detrimental effects of fake news in today's society. In recent years, the proliferation of fake news has had a profound negative impact on individuals and communities alike. False information spreads rapidly, causing confusion, division, and mistrust among people.

Latrodectus, are you coming back?

At the end of May 2024, the largest ever operation against botnets, dubbed Operation Endgame, targeted several botnets including IcedID, SystemBC, Pikabot, Smokeloader, Bumblebee, and Trickbot. This operation significantly impacted the botnets by compromising their operations and shutting down their infrastructure. Although Latrodectus was not mentioned in the operation, it was also affected and its infrastructure went offline.

Introducing New Investigation Features for Sysdig Secure

Cloud migration and continuous innovation provide organizations with substantial gains in speed, scalability, and cost (to name a few). Most security teams have no choice but to make the jump to the cloud, in at least some capacity, to support and protect this rapidly expanding attack surface. But organizations and security teams aren’t alone. Threat actors have been readily adapting their craft to take advantage of cloud speed.

Black Box Security Testing - Process, Types and Techniques

With cybercrime costs projected to hit $10.5 trillion by 2025, securing digital assets is more critical than ever. Black box testing in security has become a key strategy for organizations to identify vulnerabilities in software and systems proactively. This blog delves into the essential role of black box security testing in mitigating risks along with its various types and techniques.

Ongoing Monitoring for Third-Party Risk Management (Full Guide)

Ongoing monitoring is a key step in effective Third-Party Risk Management (TPRM) that helps ensure continuous compliance, cybersecurity performance, and risk management of external vendors and service providers. It’s a necessary step that reinforces how vendors are managing their cybersecurity processes to prevent potential data breaches or reputational damage.

A Deep Dive into SELinux

Security-Enhanced Linux (SELinux), initially known for its perceived complexity in configuration and maintenance, has evolved into an indispensable security architecture across most Linux distributions. It empowers administrators to finely control the actions permitted to individual users, processes, and system daemons, thereby bolstering defense against potential security breaches.