Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Microsoft Copilot for Security - Proper Configuration is the Key

Microsoft Copilot for Security is a powerful new artificial intelligence tool that can help companies home in on credible cybersecurity threats amid an onslaught of noise. However, significant expertise is required to configure and operate it properly and avoid unnecessary costs. These are a few key takeaways from the webinar, "Getting Started with Microsoft Copilot for Security", presented by Dan Gravelle, Director of Global Solutions Architecture at Trustwave.

Public Sector Breach Alert: Q3 2024

The public sector has faced a surge of cyber attacks in recent months, targeting state agencies, schools and local governments, severely affecting operations. Several recently released cyber industry reports show a steady or growing number of ransomware attacks so far in 2024. The examples below are just some of the cyber attacks against public sector organizations this past summer.

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content

HTML smuggling techniques have been around for quite some time. A previous Trustwave SpiderLabs’ blog discussed its use in distributing malware by storing binaries in immutable blob data within JavaScript code that gets decoded on the client-side browser, eventually delivering the payload.

Deep Learning Explained: Structured vs Unstructured Data | Razorthorn Security

Josh Neil explains the concept of deep learning and how it was designed to discover structure in unstructured data, such as images and text. Learn why this technology is key to advancements in cybersecurity. #DeepLearning #StructuredData #CyberSecurity.

Top 7 User Activity Monitoring (UAM) Tools for 2024

Every step you take, every move you make, some company will be watching you. While user activity monitoring may sound invasive at first, the growing number of insider and external threats makes it compulsory for companies to understand how users interact with their systems. 43% of workers report their employer monitors their online activity, and this percentage rises to 48% for hybrid employees.

The 443 Podcast - Episode 307 -How To Deanonymize the TOR Network

This week on the podcast, we discuss how German law enforcement managed to deanonymize and arrest users on the TOR network. After that, we discuss why the US government is trying to ban Chinese-manufactured car hardware. We then end with a cool research article on chaining open redirect and iframe issues into a 1-click vulnerability that grants attackers access to arbitrary Google Docs files. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Why the CISO & CIO Must Partner for Cyber Resilience

In today’s interconnected world, where the digital landscape is constantly evolving, the threats to an organization’s cybersecurity posture are more sophisticated and pervasive than ever before. Relying on traditional, largely prevention-focused cybersecurity tools and approaches is not enough. Cyber attacks are inevitable.

Deciphering the Loss Exceedance Curve in Cyber Risk Quantification

On-demand cyber risk quantification (CRQ) models have the power to assess an organization’s unique risk profile and, subsequently, generate data-driven insights that facilitate informed risk management decisions. The basis of these insights is grounded on a probabilistic approach to event forecasting, which involves simulating thousands of potential cyber scenarios a business may experience over a given period, typically the upcoming year.