Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Trustwave Data Reveals HTML Attachments, QR Codes, and BEC as Top Email Attack Vectors

The Trustwave SpiderLabs team regularly collects a trove of data while protecting clients from email-based attacks. HTML attachments, malicious QR codes, and business email compromise (BEC) are the favored attack methods. A recent snapshot of data from June 2024 from Trustwave MailMarshal shows that email-based threat actors still favor HTML attachments to deliver a variety of malware types.

Navigating the AI-powered development era in financial services

Australian and New Zealand financial service institutions (FSIs) are facing pressure to innovate quickly while maintaining robust security and regulatory compliance. Many, like ANZ Bank and Commonwealth Bank, are exploring Generative AI to accelerate software development, but is it a silver bullet?

The Willy Wonka World of Application Security Defenses

One doesn’t have to be a magician to understand how to track the hundreds, if not thousands, of applications that are running on your network. To lighten the load and eliminate the need for having supernatural abilities, let’s go over some simple tasks a security defender can take to track, detect, and even block application threats.

Cloud identity insights - Detect at the edge in real time

Cloud attacks strike fast. Prevention used to be enough, but not anymore. And legacy EDR tools fall short because they lack visibility into cloud identities and behavior. Defenders need the ability to detect at the edge - in real time - and correlate early stage identity behavior to see what's happening fast.

The 443 Podcast - Episode 304 - Are TP-Link's Days Numbered?

This week on the podcast, we discuss the US government's push to investigate the risks that TP-Link network devices introduce to national security. Before that, we give an update on the NPD data breach from last week as well as the threat actor behind it. We also discuss an ongoing cyber incident at the Port of Seattle. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Comprehensive Guide to Cyber Insurance for MSPs

Cybercrime is as lucrative as ever, generating millions in illicit revenues for threat actors. Between 2021 and 2023, global data breaches rose by 72%, breaking all previous records. Meanwhile, data breach costs continue to rise. The average cost of an enterprise data breach in 2024 is $4.88 million — another all-time high. This puts managed service providers (MSPs) in a tight position. Cyber liability insurance can help reduce exposure to steep losses associated with cyberattacks.

The Hidden Risks of Internet of Bodies (IoB): Cybersecurity in Healthcare Devices

The Internet of Bodies, or IoB, represents a groundbreaking shift in the healthcare industry, connecting vital health management devices like pacemakers, insulin pumps, and health monitors to the Internet. While these advancements come with many remarkable benefits, they also expose these essential devices to new cybersecurity vulnerabilities.

How To Mitigate the Risk of Ransomware Attacks

You can mitigate the risk of ransomware attacks by regularly backing up your data, updating your device with the latest software, implementing least-privilege access, using a business password manager and educating employees about security awareness, among other things. Ransomware attacks occur when organizations are prevented from accessing files and data until they’ve paid a ransom to the cybercriminal who infected their devices with malware.

Surviving to Thriving: Navigating SIEM Complexity

We've all heard the news; the SIEM market is changing like never before. With recent mergers and acquisitions, security professionals are finding themselves on shaky ground. It only gets more complex — teams are flooded with new tools, an avalanche of data, and a shortage of skilled professionals. It's no wonder that only 28% of security professionals believe their SOC is functioning effectively.