Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Pentest People Achieves CREST CSIR Accreditation for Incident Response Services

The CREST Cyber Security Incident Response (CSIR) accreditation is an esteemed certification designed to assure that an organisation has the necessary processes, skills, and capabilities to support clients in mitigating, responding to, and recovering from cyber incidents. CREST, a globally recognised accreditation body, sets the benchmark for high standards in cyber security, ensuring that accredited companies deliver excellence in every facet of cyber response services.

Ransomware Readiness: 10 Steps Every Organization Must Take

At the end of every year, the Trustwave content team asks its in-house experts what cybersecurity topics they predict will be top of mind in the coming 12 months, and inevitably the top answer is more ransomware. Instead of waiting an extra couple of months, we thought why not get ahead of the curve, pretend that ransomware will again be an issue, because it will, and proceed to the part of the story where we go through the problem and mitigation methods.

Creating noise: The emerging obfuscation technique designed to evade email security NLP detection capabilities

Our Threat Intelligence team has observed an emerging obfuscation technique, specifically used to make Natural Language Processing (NLP) detection capabilities less effective. Broadly, malicious actors are adding additional characters, break lines, and legitimate links to the end of a phishing email in an attempt to disguise their malicious payloads amongst the noise and evade NLP detection.

FBI Warns Scammers Are Targeting Law Firms For Phony Debt Collections

The U.S. FBI warns that scammers are attempting to trick law firms into transferring money as part of a phony debt collection scheme. The scam “may focus on any type of representation where a lawyer is hired to assist in the transfer or collection of money, e.g. real estate, collection matters, collaborative law agreements in family matters, etc.” The schemes typically take the following steps: The FBI outlines some recommendations to help organizations avoid falling for these scams.

3 ways real companies complete security questionnaires faster

Security reviews are a critical step in the buying process where prospects assess your organization’s security posture and evaluate the risks associated with your business. The process typically occurs just before a deal is signed and sealed—when the stakes are especially high. ‍ Anyone who’s been involved in a security review before knows all too well how time-consuming, clunky, and manual the process can be.

Beyond Passwords: Advanced API Authentication Strategies for Enhanced Security

Passwordless authentication for end users is taking the world by storm, offering organizations and individuals alike unprecedented security, user experience, and efficiency benefits. By all indications, the next generation of authentication for end users has finally arrived, sending the password the way of the dodo. Although they don’t get anywhere near the same hype, advanced authentication strategies for APIs are as critical as passwordless authentication for end-users.

Enhancing Detection Fidelity: Fight Alert Fatigue with Accurate and Reliable Detections

In today's rapidly evolving cybersecurity landscape, the importance of detection fidelity cannot be overstated. Security operations center (SOC) teams are overwhelmed by the sheer volume and complexity of alerts and challenged to differentiate genuine threats from false positives.

DORA Compliance: Key Insights for Financial Institutions on New EU Regulations

As the January 2025 deadline approaches, financial institutions across the European Union prepare to increase their financial data security by meeting regulatory compliance standards with the Digital Operational Resilience Act (DORA). But what exactly is DORA, and why does it matter for your organisation? Let’s take a closer look.