Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Malicious Inauthentic Falcon Crash Reporter Installer Distributed to German Entity via Spearphishing Website

On July 24, 2024, CrowdStrike Intelligence identified an unattributed spearphishing attempt delivering an inauthentic CrowdStrike Crash Reporter installer via a website impersonating a German entity. The website was registered with a sub-domain registrar.

Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike's Threat Actor List

On July 24, 2024, hacktivist entity USDoD claimed on English-language cybercrime forum BreachForums to have leaked CrowdStrike’s “entire threat actor list.”1 The actor also alleged that they had obtained CrowdStrike’s “entire IOC list” and would release it “soon.” In the announcement, USDoD provided a link to download the alleged threat actor list and provided a sample of data fields, likely in an effort to substantiate their claims.

Trustwave Named as a Representative Vendor in the 2024 Gartner Market Guide for Digital Forensics and Incident Response Retainer Services

For the second week in a row, Trustwave proudly announces recognition from the industry analyst firm Gartner. Today, Trustwave is proud to reveal that Gartner has named us as a Representative Vendor in the 2024 Gartner Market Guide for Digital Forensics and Incident Response (DFIR) Retainer Services. This news follows Trustwave's announcement last week stating we were named a Representative Vendor in the 2024 Gartner Market Guide for Managed Detection and Response.

WatchGuard Endpoint Release Process

Recent news of a global IT disruption caused by a security vendor’s content update has driven important conversations about quality assurance processes for endpoint products and content updates. At WatchGuard, with more than 30 years of experience in this industry, we know well the sensitivity of the update process and wanted to take this opportunity to highlight the processes we have in place to protect our valued partner community and customers from the impacts of a flawed update rollout.

The Hidden Dangers and Opportunities of Generative AI: What Enterprises Need to Know

Since the launch of ChatGPT in November 2022, generative AI (genAI) has seen rapid enterprise adoption. According to researchers in the Netskope Threat Labs, as of June 2024, an astonishing 96% of organizations are using various types of genAI apps. This widespread adoption is transforming how businesses operate, but with great power comes great responsibility—and risk.

Building a comprehensive Trust Center

In today's digital landscape, trust is paramount. Customers want to know that their data is secure and that they can rely on the companies they do business with. ‍ One of the best ways to provide this assurance is through a well-crafted, up-to-date Trust Center. But what exactly should go into a Trust Center? How easy are they to maintain, and how much manual work do they save security teams?

How To Check Your iPhone for Viruses

You can check your iPhone for viruses by checking for unfamiliar apps, seeing if your data usage has spiked, seeing an unusual number of pop-up ads and noticing if specific apps are draining your battery. A virus is a type of malicious software that can infect any device, like your iPhone, and then replicate itself on your device’s programs or files.

My Apple ID Was Hacked. What Should I Do?

If your Apple ID was hacked, some immediate steps you can take include resetting your password and setting up Two-Factor Authentication (2FA). You should also consider placing a fraud alert on your credit report. A fraud alert is helpful because it requires lenders and creditors to go through additional steps to ensure your identity in case whoever hacked your Apple ID was planning on opening credit in your name.

Is It Safe to Password-Protect a PDF File?

No, it’s not safe to password-protect PDF files because your files are not guaranteed to be protected from cybercriminals intercepting and gaining unauthorized access to your information. Often, people password-protect a PDF file to protect sensitive information and set permissions on how the PDF file can be used. If you password-protect a PDF file, you can choose whether you want a recipient of the file to view or edit the file.