Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trustwave MDR Accelerates Automotive Company's Cybersecurity Posture

For many organizations, especially those in industries like automotive manufacturing, navigating escalating cyber threats and meeting stringent insurance requirements is no simple endeavor. This is where a robust solution like Trustwave Managed Detection and Response (MDR) can make all the difference.

Thousands of WordPress Sites at Risk After Gravity Forms Breach

A critical vulnerability in the popular Gravity Forms WordPress plugin has led to widespread malware injections across thousands of sites. The flaw is being actively exploited by threat actors, some of whom are inserting backdoors and malicious JavaScript into WordPress sites to carry out data theft, SEO poisoning, and client-side attacks.

Thousands of Spoofed News Sites Are Pushing Push Investment Fraud Scams

Scammers are using over 17,000 phony news sites to push investment fraud, according to a new report from CTM360. These websites, which the researchers call “Baiting News Sites (BNS),” spread via legitimate ad platforms such as Google or Meta. The sites impersonate well-known news providers, including CNN, the BBC, CNBC, News24, and ABC News. If a user clicks on one of these sites, they’ll be shown a fake news article about a well-known figure promoting a phony investment opportunity.

FTC Advisory: How to Protect Yourself Against Job Scams

The US Federal Trade Commission (FTC) has issued an advisory warning of job scams that impersonate well-known companies with tempting employment opportunities. The scammers are trying to steal users’ personal and financial information in order to steal their money or launch further attacks.

How CleanINTERNET DNS Stops DNS Tunneling Before It Starts

Modern cyber threats are increasingly stealthy. A favorite tactic? DNS tunneling—a method used to bypass traditional network security controls by hiding malicious traffic inside DNS queries and responses. This can be done by embedding or encoding command and control instructions or data within subdomains or DNS record fields like TXT, CNAME or other rarely used record types.

8 Features To Look For in a Password Manager

A password manager protects your online accounts by storing all your passwords in one place, making it easier to use strong, unique passwords for every account without having to remember them all. Many password managers also support passkeys, which make logging in even safer and easier as an alternative to traditional passwords.

Why are non-human identities suddenly such a big deal?

If you are like me, a couple of years ago it was like I woke up to a new concept in the world of IT: the non-human identity. But, wait…this sounds very familiar. Haven’t we had service accounts and machines identities for performing automated tasks for many years now? In fact, I was on a development team that produced what is now known as RPA tools that helped automate repetitive IT tasks; an area highly used by many enterprises.

Retail Under Siege: Understanding and Combating Modern Cyber Threats

In the ever-evolving world of retail, cyber threats are no longer a distant concern, they’re a daily reality. Over the past year, around 612,000 UK businesses reported experiencing a cyber breach or attack. Phishing remains the most common and disruptive method, targeting 85% of those affected. The retail sector, in particular, sits on a goldmine of customer data, credit card details, email addresses, and purchase histories, all of which are highly attractive to cybercriminals.

Hidden Geo-Risk: Why Most Mobile App Security Tools Fail Compliance

Most mobile security conversations start with code: vulnerabilities, misconfigurations, tokens, and flaws. But few discussions focus on a critical dimension—location: not where an app is used, but where its data travels. In modern mobile architectures, dozens of services operate behind the scenes. SDKs phone home. APIs call upstream. CDNs redirect without warning. Within this chaos, a single, silent connection to a sanctioned region can escalate into a compliance crisis.