Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Analyzing Latrodectus: The New Face of Malware Loaders

This report is the latest in a series that will delve into the deep research the Trustwave SpiderLabs Threat Intelligence team conducts daily on the major threat actor groups currently operating globally. The information gathered is part of a data repository that helps Trustwave SpiderLabs identify possible intrusions as it conducts threat hunts, vulnerability scans, and other offensive and defensive security tasks.

Why Presidio and Other Data Masking Tools Fall Short for AI Use Cases Part 1

Data privacy and security are critical concerns for businesses using Large Language Models (LLMs), especially when dealing with sensitive information like Personally Identifiable Information (PII) and Protected Health Information (PHI). Companies typically rely on data masking tools such as Microsoft’s Presidio to safeguard this data. However, these tools often struggle in scenarios involving LLMs/AI Agents.

Cloudflare acquires Kivera to add simple, preventive cloud security to Cloudflare One

We’re excited to announce that Kivera, a cloud security, data protection, and compliance company, has joined Cloudflare. This acquisition extends our SASE portfolio to incorporate inline cloud app controls, empowering Cloudflare One customers with preventative security controls for all their cloud services.

Securing Our World in 2024 With Cyber Risk Quantification

‍Security is no longer solely confined to the physical, dependent on bodily actions. With the advent of the internet, the mechanisms necessary for safeguarding assets and even lives have expanded into the cyber realm, where the risks can be even more complex. Indeed, a single cyber event has the power to render hospitals nonfunctional, halt mass transportation, block financial transactions, and cause billions of dollars worth of damages.

Guiding your organization with the 2024 Elastic Global Threat Report

Mitigating risk based on the threat landscape is a complicated yet essential part of being a CISO, which is why threat reports like the 2024 Elastic Global Threat Report are a huge help for me. In addition to providing an in-depth understanding of what’s happening, threat reports also offer a quick overview of what needs to be explained or communicated to the rest of the organization.

4 Tips to Stay Secure for Cybersecurity Awareness Month

October is Cybersecurity Awareness Month (CSAM). It’s a crucial time to equip ourselves with the knowledge and tools to navigate the digital landscape safely. With remote work, virtual learning, and the rapid adoption of new technologies, cyber threats are at an all-time high. As cybersecurity professionals, we have a unique opportunity to spread awareness and share our expertise to help others stay secure online.

Understanding the Dora Compliance: A Comprehensive Guide

Technology is always brimming with advancements, and it is more prominent in the financial sector. As financial institutions increasingly rely on digital infrastructure to enhance operations, customer experience, and security, they also face growing challenges in mitigating the risks that come with it, such as cyber threats, system failures, and other operational vulnerabilities.

Don't Treat DAST Like Dessert

Dynamic Application Security Testing (DAST), sometimes referred to as “pentesting in a box”, tests running code for a variety of issues that can’t easily be found by analyzing code with static scanning tools. DAST tools are platform and language agnostic—as long as you have a website or API they can connect to, they’ll get the job done, and find real vulnerabilities in the same places an attacker would.

Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Trustwave's Threat Intelligence team has discovered a new malware dubbed Pronsis Loader, with its earliest known variant dating back to November 2023. This loader shares similarities with the D3F@ck Loader , which surfaced in January 2024. Pronsis Loader has been observed delivering different malware variants, including Lumma Stealer and Latrodectus as its primary payloads. Additionally, the team identified infrastructure linked to Lumma Stealer during the investigation.

SnykLaunch Oct 2024: Enhanced PR experience, extended visibility, AI-powered security, holistic risk management

After almost a decade in business, we’ve had the opportunity to watch the software development industry change dramatically. Developers work with more moving parts than ever, relying on technologies like third-party resources and AI coding assistants to release sophisticated software on tight deadlines. While we’ve been talking about the relationship between development and security for the past decade, the DevSecOps conversation has shifted quite a bit.