Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails

Previously, Trustwave SpiderLabs covered a massive fake order spam scheme that impersonated a tech support company and propagated via Google Groups. Since then, we have observed more spam campaigns using this hybrid form of cyberattack with varying tactics, techniques, and procedures (TTP). Between July and September, we witnessed a 140% increase in these spam campaigns. In this blog, we will showcase the different spam techniques used in these phishing emails.

Creative Approaches to Keeping Cybersecurity Awareness Engaging

In this recorded session, we explore innovative methods to make cybersecurity awareness both effective and engaging. Learn how to incorporate interactive training, gamification, real-world scenarios, and creative communication strategies to keep your team informed and vigilant against potential cyber threats. These fresh approaches will help foster a strong culture of security within your organization while keeping employees motivated and actively involved in maintaining cybersecurity.

LLM Guardrails: Secure and Accurate AI Deployment

Deploying large language models (LLMs) securely and accurately is crucial in today’s AI deployment landscape. As generative AI technologies evolve, ensuring their safe use is more important than ever. LLM guardrails are essential mechanisms designed to maintain the safety, accuracy, and ethical integrity of these models. They prevent issues like misinformation, bias, and unintended outputs.

Cybersecurity Awareness Month: The Great Offensive Security/Active Defense Strategy

It’s Cybersecurity Awareness Month and you know what that means. We spend every spare hour waiting for The Great Pumpkin. As many of us know, (and we’re going to stretch this analogy to the limit) Linus actively created an environment that would attract The Great Pumpkin by establishing the sincerest pumpkin patch in the neighborhood. Furthermore, he went on the offensive to attract others to his belief that The Great Pumpkin would appear on Halloween night.

What a 3-Year Plan to Cut Software Risks by 75% Looks Like

Organizations face an increasing number of software security threats that can compromise their sensitive data and disrupt business operations. To effectively manage these risks and enhance their security posture, it’s crucial for organizations to adopt modern application risk reduction strategies that not only mitigate potential vulnerabilities but also provide clear, actionable next steps and insights for reporting purposes.