Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trustwave Named as a Representative Vendor in the 2024 Gartner Market Guide for Digital Forensics and Incident Response Retainer Services

For the second week in a row, Trustwave proudly announces recognition from the industry analyst firm Gartner. Today, Trustwave is proud to reveal that Gartner has named us as a Representative Vendor in the 2024 Gartner Market Guide for Digital Forensics and Incident Response (DFIR) Retainer Services. This news follows Trustwave's announcement last week stating we were named a Representative Vendor in the 2024 Gartner Market Guide for Managed Detection and Response.

Optimizing Threat Hunting Operations: The CISOs Guide to Efficient and Effective Security Operations

Threat hunting is a proactive approach to detecting advanced threats that may bypass traditional security measures. However, many CISOs struggle with implementing effective threat hunting operations due to a lack of visibility and resources. This webinar will address the complexities of threat hunting and how LimaCharlie can provide the tools and insights needed to optimize these operations.

Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike's Threat Actor List

On July 24, 2024, hacktivist entity USDoD claimed on English-language cybercrime forum BreachForums to have leaked CrowdStrike’s “entire threat actor list.”1 The actor also alleged that they had obtained CrowdStrike’s “entire IOC list” and would release it “soon.” In the announcement, USDoD provided a link to download the alleged threat actor list and provided a sample of data fields, likely in an effort to substantiate their claims.

Malicious Inauthentic Falcon Crash Reporter Installer Distributed to German Entity via Spearphishing Website

On July 24, 2024, CrowdStrike Intelligence identified an unattributed spearphishing attempt delivering an inauthentic CrowdStrike Crash Reporter installer via a website impersonating a German entity. The website was registered with a sub-domain registrar.

CVE discovery, PoC Development, IAB Listings, to Ransomware Attacks: How Cybercriminal Forums Facilitate the Lifecycle

By Olivia Betts and Adam Price In July 2024, CloudFlare identified that it can take cybercriminals as little as 22 minutes to weaponise a publicly available Proof-of-Concept (PoC) exploit following its release. The IT services management company noted an increase in scanning for disclosed Common and in attempts to weaponise available PoCs across 2023 and 2024.

Fireblocks Integrates with Axelar

Axelar is a Web3 interoperability platform designed to connect various blockchains. Its technology facilitates multichain applications that span different networks, aiming to address scalability challenges that can hinder development and integration. AXL, a proof-of-stake token, makes it possible for this infrastructure to operate at the highest, most decentralized standard of security.

Building Graph API Custom Plugins for Copilot for Security

As we explored the capabilities of Copilot for Security, we discovered that while the native plugins offer access to a vast array of data, they didn't cover everything we needed for some of our specific use cases and promptbooks. For instance, we wanted detailed insights into Conditional Access policies from Entra ID, Intune policies, Secure Score, and more. Although Microsoft continues to enhance the native plugins by adding new skills, we opted to develop our own custom plugins.

The Industry-leading AI-Driven Security Operations Platform from Exabeam

The next time a vendor tells you “we stop all breaches” or “our AI is more effective”, ask them how they stop attacks using compromised credentials. Exabeam pioneered AI in SIEM, using machine learning-based AI for over 10 years to enable AI and automation across security operations workflows to deliver faster and more accurate threat detection, investigation, and response (TDIR).