Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Perspectives on New EU Data Regulations' Impact and Consequences for IT Leaders

If you look at your home already, you use so much that is connected to the Internet, you couldn't imagine being without it. The same applies to our critical infrastructure. A physical attack is no longer the only attack on critical infrastructure. But how can we defend it? Trish McGill, Brian Wagner, and Tim Clements have the answer.

Analyzing Latrodectus: The New Face of Malware Loaders

This report is the latest in a series that will delve into the deep research the Trustwave SpiderLabs Threat Intelligence team conducts daily on the major threat actor groups currently operating globally. The information gathered is part of a data repository that helps Trustwave SpiderLabs identify possible intrusions as it conducts threat hunts, vulnerability scans, and other offensive and defensive security tasks.

Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Trustwave's Threat Intelligence team has discovered a new malware dubbed Pronsis Loader, with its earliest known variant dating back to November 2023. This loader shares similarities with the D3F@ck Loader , which surfaced in January 2024. Pronsis Loader has been observed delivering different malware variants, including Lumma Stealer and Latrodectus as its primary payloads. Additionally, the team identified infrastructure linked to Lumma Stealer during the investigation.

Ransomware Defense Essentials: Why EDR and NDR Are Key

Increasingly targeted ransomware attacks, has cyber professionals on high alert securing their networks and understandably with a single attack being potentially such a massive loss (both in terms of finance, operational disruption as well as brand damage). A company that relies on its data to operate or grow should make setting in place a defense against ransomware a top priority. But we cannot take any protection measure without knowing what ransomware is all about.

The Results from Dreamforce are In: Salesforce Users Love Rubrik

Dreamforce 2024 once again proved to be a monumental event, with major AI advancements, product announcements, and keynotes that inspired the entire tech community. Among the highlights, Salesforce's introduction of Agentforce took center stage, offering businesses the ability to deploy autonomous AI agents that optimize customer interactions and streamline operations.

What Are Hardware and Software Keyloggers? How Can You Spot and Prevent Them?

In this video, learn what hardware and software keyloggers are, signs you may have one, how to prevent them, and more. Learn more about: Resources and social media: Transcript: Do you remember every key you pressed on your laptop today? Every word you typed in an email? Every password you punched in? Every digit you entered for your credit card? For you and me, recalling all that information is next to impossible. But not for a Keylogger.

Use these simple rules to detect common attacker tools

One of the most powerful weapons at an attacker’s disposal is the use of specialized tools designed to compromise network security. Mimikatz, BloodHound, and winPEAS are just a few examples of tools that can wreak havoc in your environment if left undetected. In this article, we’ll explore how malicious actors can exploit specialized tools to launch sophisticated attacks.

Embargo Ransomware Expands Attacks to Cloud Environments

Ransomware continues to evolve, and the latest escalation in tactics comes from the Embargo ransomware group. Threat actor Storm-0501, known for its previous ties to various ransomware groups, has now shifted its focus towards hybrid cloud environments, targeting both on-premise and cloud-based systems. This strategic shift poses significant risks for organizations relying on cloud infrastructure, particularly those in critical sectors such as healthcare, government, transportation, and law enforcement.

Understanding and Detecting Lateral Movement

A ransomware attack is underway. The threat actor has gained initial access to an endpoint and executed malicious code on it. As far as the threat actor is concerned, things are going well. However, the next stage is critical to a ransomware attack’s success. Without the ability to spread throughout the entire environment, encrypting or locking up all systems, threat actors are unlikely to be able to extort payment from an organization.