Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Facebook Ad to Near Breach: The Power of Threat Hunting in Modern MDR

While security professionals know well that a defense-in-depth strategy is crucial to proper cybersecurity, sometimes a detailed story of how a threat was discovered and eradicated can bring the value home, especially to the uninitiated. This is one such story. In this case, the story relates to the value of employing a cybersecurity threat hunting service alongside a managed detection and response offering.

Lights Out and Stalled Factories: Using M.A.T.R.I.X to Learn About Modbus Vulnerabilities

Let’s explore the critical role of Modbus in energy and manufacturing systems, then demonstrate real-world exploitation techniques using Docker-based simulations and the custom-built Python tool M.A.T.R.I.X. The danger here is an attacker who gains unauthorized access to a misconfigured Modbus TCP server can send malicious write commands to turn coils ON or OFF, thereby illegally activating or deactivating physical devices.

Migration Made Easy Using Trustwave's Microsoft Security Migration Program

The need to purchase, install, and optimize cybersecurity technology is not up for debate. No organization is immune to the possibility of a cyberattack, which means each must be prepared to defend themselves to reduce the likelihood of a successful attack. While organizations start out with the goal of keeping their tech stack simple, cost-effective, and productive, many find that over time, the technology they have acquired has the polar-opposite impact.

Why Microsoft Email Security Benefits from a Layered Approach

The best secure email gateways mimic the tried and true “defense in depth” cybersecurity strategy by using a layered approach, including advanced features that make effective use of AI. The results are compelling, especially when two email security tools are used together, such as employing an additional secure email gateway to augment Microsoft Defender for Office 365 email security.

Trustwave Takes Home SC Trust Award for Best Managed Security Service

SC Media calls out Trustwave’s ability to maximize the value of their Microsoft Security tools for clients. Trustwave was honored by SC Media with its prestigious SC Trust Award for Best Managed Security Service in recognition of its Managed Extended Detection and Response (MXDR) for Microsoft.

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs

Threat actors who rely on email phishing scams as their primary method of gaining initial entry use a wide variety of social engineering lures to trick their victims. Trustwave SpiderLabs recently released the report Manufacturing Sector Deep Dive: Methods of Targeting and Breaching, which specifically calls out many noteworthy campaigns and methodologies used by the top-tier threat groups.