Threat Intelligence

Phishing and Ransomware: How Threat Actors Attack the Financial Services Sector

Phishing and Ransomware: How Threat Actors Attack the Financial Services Sector 2024-09-04 at 16:01 By Trustwave SpiderLabs is prepped to launch its newest threat intelligence research, the 2024 Trustwave Risk Radar Report: Financial Services Sector. The upcoming report, which is set to be released on September 10, promises to be an indispensable resource for cybersecurity […]

React to this headline:

Loading spinner

Phishing and Ransomware: How Threat Actors Attack the Financial Services Sector Read More »

CERT-In Advisory and WikiLoader Campaign: Comprehensive Overview of Recent Security Threats

CERT-In Advisory and WikiLoader Campaign: Comprehensive Overview of Recent Security Threats 2024-09-03 at 18:46 By dakshsharma16 CERT-In’s advisory on Palo Alto Networks vulnerabilities and WikiLoader’s fake GlobalProtect installers highlight major security risks. Key Takeaways Overview CERT-In’s recent advisory and the emergence of WikiLoader malware highlight pressing security concerns involving Palo Alto Networks applications and new

React to this headline:

Loading spinner

CERT-In Advisory and WikiLoader Campaign: Comprehensive Overview of Recent Security Threats Read More »

Iranian State-Sponsored Hackers Have Become Access Brokers for Ransomware Gangsca

Iranian State-Sponsored Hackers Have Become Access Brokers for Ransomware Gangsca 2024-09-02 at 20:01 By dakshsharma16 Iranian state-backed actors operating under aliases like “Pioneer Kitten” are increasingly targeting critical infrastructure – and expanding their activities into brokering access for ransomware affiliates. Key Takeaways Overview They move silently across networks, leveraging every vulnerability left unpatched, exploiting gaps

React to this headline:

Loading spinner

Iranian State-Sponsored Hackers Have Become Access Brokers for Ransomware Gangsca Read More »

Weekly IT Vulnerability Report: Cyble Researchers Find Nearly 1 Million Exposed Fortinet, SonicWall Devices

Weekly IT Vulnerability Report: Cyble Researchers Find Nearly 1 Million Exposed Fortinet, SonicWall Devices 2024-08-30 at 16:31 By dakshsharma16 Key Takeaways Overview Cyble’s weekly vulnerability report for August 21-27 found the highest number of exposed vulnerable assets in nearly three months, since a widespread PHP vulnerability was found in early June. Cyble researchers found more

React to this headline:

Loading spinner

Weekly IT Vulnerability Report: Cyble Researchers Find Nearly 1 Million Exposed Fortinet, SonicWall Devices Read More »

Critical Advisory on RansomHub Ransomware: A Comprehensive Analysis and Mitigation Guide

Critical Advisory on RansomHub Ransomware: A Comprehensive Analysis and Mitigation Guide 2024-08-30 at 16:16 By dakshsharma16 Key Takeaways Overview On August 29, 2024, a joint advisory was issued by the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Department of Health and Human

React to this headline:

Loading spinner

Critical Advisory on RansomHub Ransomware: A Comprehensive Analysis and Mitigation Guide Read More »

Trustwave Named the Innovation Leader by Frost & Sullivan for the Americas and Europe

Trustwave Named the Innovation Leader by Frost & Sullivan for the Americas and Europe 2024-08-28 at 16:01 By The analyst firm Frost & Sullivan has recognized Trustwave with the dual honors of being positioned as the Innovation leader in its 2024 Managed Security Services (MSS) Radar, Americas, and 2024 MSS Radar, Europe, the second time

React to this headline:

Loading spinner

Trustwave Named the Innovation Leader by Frost & Sullivan for the Americas and Europe Read More »

CVE-2024-39717 Exposes Critical Vulnerability in Versa Director

CVE-2024-39717 Exposes Critical Vulnerability in Versa Director 2024-08-28 at 16:01 By dakshsharma16 Meta description: CISA warns of CVE-2024-39717 in Versa Director, urging updates to version 22.1.4, MFA usage, and strengthening network security to prevent exploitation. Key Takeaways Overview The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a new vulnerability to its Known

React to this headline:

Loading spinner

CVE-2024-39717 Exposes Critical Vulnerability in Versa Director Read More »

Check Point to Acquire External Cyber Risk Management Firm Cyberint

Check Point to Acquire External Cyber Risk Management Firm Cyberint 2024-08-28 at 16:01 By Mike Lennon Check Point says the acquisition will enhance its own SOC capabilities and expand its managed threat intelligence offerings. The post Check Point to Acquire External Cyber Risk Management Firm Cyberint appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Check Point to Acquire External Cyber Risk Management Firm Cyberint Read More »

Cloud Storage Bucket Security: PII Leak Brings Renewed Focus to Storage Bucket Access Controls

Cloud Storage Bucket Security: PII Leak Brings Renewed Focus to Storage Bucket Access Controls 2024-08-27 at 18:16 By dakshsharma16 Key Takeaways Overview A Google Cloud Storage bucket leak has brought renewed attention to the risk of misconfigured cloud storage buckets, one of the most common cloud security issues and causes of data leaks. Alice’s Table,

React to this headline:

Loading spinner

Cloud Storage Bucket Security: PII Leak Brings Renewed Focus to Storage Bucket Access Controls Read More »

High-Risk CVE-2024-7965 Vulnerability in Chrome’s V8 Engine Requires Quick Fix

High-Risk CVE-2024-7965 Vulnerability in Chrome’s V8 Engine Requires Quick Fix 2024-08-27 at 17:31 By dakshsharma16 Key Takeaways Overview CISA has recently added a type of confusion vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. This flaw affects the popular Google Chrome browser and potentially other Chromium-based browsers. It poses a serious risk and has been

React to this headline:

Loading spinner

High-Risk CVE-2024-7965 Vulnerability in Chrome’s V8 Engine Requires Quick Fix Read More »

Exposed and Encrypted: Inside a Mallox Ransomware Attack

Exposed and Encrypted: Inside a Mallox Ransomware Attack 2024-08-27 at 16:16 By Bernard Bautista Recently, a client enlisted the support of Trustwave to investigate an unauthorized access incident within its internal cloud-based environment, leading to the deployment of Mallox ransomware by threat actors to its server. This article is an excerpt from SpiderLabs Blog View

React to this headline:

Loading spinner

Exposed and Encrypted: Inside a Mallox Ransomware Attack Read More »

Trustwave Data Reveals HTML Attachments, QR Codes, and BEC as Top Email Attack Vectors

Trustwave Data Reveals HTML Attachments, QR Codes, and BEC as Top Email Attack Vectors 2024-08-26 at 16:01 By The Trustwave SpiderLabs team regularly collects a trove of data while protecting clients from email-based attacks. HTML attachments, malicious QR codes, and business email compromise (BEC) are the favored attack methods. This article is an excerpt from Trustwave Blog

React to this headline:

Loading spinner

Trustwave Data Reveals HTML Attachments, QR Codes, and BEC as Top Email Attack Vectors Read More »

Trustwave Earns Dual Honors in ISG’s 2024 Provider Lens™ Quadrant Reports

Trustwave Earns Dual Honors in ISG’s 2024 Provider Lens™ Quadrant Reports 2024-08-21 at 16:01 By Trustwave was awarded a pair of honors from the industry analyst firm ISG, being named a Leader in the US for Managed Security Services – SOC (Midmarket) and as a Rising Star in the UK for Managed Security Services – SOC (Midmarket) in ISG’s

React to this headline:

Loading spinner

Trustwave Earns Dual Honors in ISG’s 2024 Provider Lens™ Quadrant Reports Read More »

OpenCTI: Open-source cyber threat intelligence platform

OpenCTI: Open-source cyber threat intelligence platform 2024-08-21 at 07:31 By Help Net Security OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables. The platform structures its data using a knowledge schema built on the STIX2 standards. It features a modern web application architecture with a GraphQL

React to this headline:

Loading spinner

OpenCTI: Open-source cyber threat intelligence platform Read More »

Active Defense and Offensive Security: The Two Sides of a Proactive Cyber Defense Program

Active Defense and Offensive Security: The Two Sides of a Proactive Cyber Defense Program 2024-08-19 at 16:02 By David Broggy Offensive security and active defense may appear at first glance as contradictory cybersecurity solutions, but when paired, they create complementary and robust protective solutions. This article is an excerpt from Trustwave Blog View Original Source

React to this headline:

Loading spinner

Active Defense and Offensive Security: The Two Sides of a Proactive Cyber Defense Program Read More »

Unlocking the Front Door: Phishing Emails Remain a Top Cyber Threat Despite MFA

Unlocking the Front Door: Phishing Emails Remain a Top Cyber Threat Despite MFA 2024-08-14 at 18:16 By Kevin Townsend SecurityWeek spoke with Mike Britton, CISO at Abnormal Security, to understand what the company has learned about current social engineering and phishing attacks. The post Unlocking the Front Door: Phishing Emails Remain a Top Cyber Threat

React to this headline:

Loading spinner

Unlocking the Front Door: Phishing Emails Remain a Top Cyber Threat Despite MFA Read More »

IntelOwl: Open-source threat intelligence management

IntelOwl: Open-source threat intelligence management 2024-08-14 at 07:31 By Mirko Zorz IntelOwl is an open-source solution designed for large-scale threat intelligence management. It integrates numerous online analyzers and advanced malware analysis tools, providing comprehensive insights in one platform. “In late 2019, I faced a significant challenge while working as a cybersecurity analyst in a Security

React to this headline:

Loading spinner

IntelOwl: Open-source threat intelligence management Read More »

Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication

Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication 2024-08-07 at 16:01 By Kevin Townsend The ransomware scourge is still growing and still successful for attackers, Rapid7’s Ransomware Radar Report 2024 shows. The post Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Ransomware in 2024: More Attacks, More Leaks, and Increased Sophistication Read More »

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains 2024-08-06 at 00:01 By Ryan Naraine AWS says a massive neural network graph model with 3.5 billion nodes and 48 billion edges is speeding up the prediction and detection of malicious domains. The post AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious

React to this headline:

Loading spinner

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains Read More »

MISP: Open-source threat intelligence and sharing platform

MISP: Open-source threat intelligence and sharing platform 2024-08-05 at 07:01 By Help Net Security MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related to incident and malware analysis. MISP is designed by and for cybersecurity, ICT professionals, and malware reversers to support their daily

React to this headline:

Loading spinner

MISP: Open-source threat intelligence and sharing platform Read More »

Scroll to Top