JIGSAW Ransomware: Deleting Files Instead of Encrypting Them

April 28, 2016 | Patrick Bedwell

Background Ransomware, which is malware that holds users’ data for ransom, ...

How to Recognize Breaches When Hackers Shift Their Focus

April 26, 2016 | Dan Kaplan

The security profession doesn't only have to bear bad news. Reasons to be ...

Watering Hole Attacks: Detecting End-User Compromise before the Damage is Done

April 26, 2016 | Kate Brew

Watering hole attacks – or the hijacking of legitimate websites to push malware ...

5 Security Things to Know for the Week of April 25

April 25, 2016 | Dan Kaplan

(Updated below)

OSX-Pirrit Adware: Notes from the Underground

April 20, 2016 | Patrick Bedwell

Background “Adware” is a portmanteau (one of my favorite words) of ...

Introducing the 2016 Trustwave Global Security Report

April 19, 2016 | Dan Kaplan

Cybercriminals have never had it so good. Most businesses are sitting on a ...

False Positives in IDS: Irritating But Often Necessary

April 19, 2016 | Kenneth Coe

Why We Should Love False Positives

False Positives in IDS: Irritating But Often Necessary

April 19, 2016 | Kenneth Coe

Why We Should Love False Positives

5 Security Things to Know for the Week of April 11

April 18, 2016 | Dan Kaplan

Follow Trustwave on Twitter, connect with us on LinkedIn and like us on ...

How Human-Based Penetration Testing is the Perfect Complement to Automated Vulnerability Scanning

April 14, 2016 | Dan Kaplan

Perhaps it is the number of painfully costly data breaches that have rocked ...

Propelling the Payments Industry: What to Expect at TRANSACT 16

April 12, 2016 | Dixie Fisher

If you're entrenched in the payments industry as a bank, processor or even ...

Using OTX Threat Intelligence to Search PCAPs for Malicious Traffic

April 07, 2016 | Jin Qian

CapStar Forensics is an AlienVault Open Threat Exchange (OTX) participant. OTX ...

8 Reasons Why the Malicious Ad Threat Is Poised to Grow Even Worse

April 05, 2016 | Dan Kaplan

A couple of weeks back, our SpiderLabs researchers told you about the latest ...

5 Security Things to Know for the Week of April 4

April 04, 2016 | Dan Kaplan

Follow Trustwave on Twitter, connect with us on LinkedIn and like us on ...

PowerWare “Fileless Infection” Deepens Ransomware Conundrum for Healthcare Providers

March 31, 2016 | Benjamin Caudill

Introduction to Ransomware The recent wave of ransomware attacks on healthcare ...

5 Highly Effective Ways for Law Firms to Protect Client Data

March 30, 2016 | Jane Dotsenko

Cybercrime is evolving rapidly and targeting all types of businesses. Where ...

Cmstar APT Malware Exploits CVE-2012-0158

March 30, 2016 | Patrick Bedwell

Background APTs (Advanced Persistent Threats) are a type of threat that targets ...

Rootkit Detection: Techniques and Best Practices

March 28, 2016 | Garrett Gross

Continuing my discussion of common classes of attacks, this time I’ll be ...

Security Awareness: Top Tips for Training Your Workers to Be Safer Online

March 23, 2016 | David Wray

Many companies neglect to teach their teams about security awareness and end up ...

Security Guidelines for Startups

March 22, 2016 | Larry Moore

Congratulations and best of luck with your new company. Whether your company ...

What to Do About Social Engineering and POS attacks in the Hotel Industry

March 21, 2016 | Jane Dotsenko

Think about your average hotel lobby on a busy day. Likely there will be ...

5 Security Things to Know for the Week of March 21

March 21, 2016 | Dan Kaplan

Follow Trustwave on Twitter, connect with us on LinkedIn and like us on ...

The Surprising Truth About Threat Detection and Response

March 21, 2016 | Dan Kaplan

When it comes to disease, doctors and health organizations often preach the ...

What to Do About Social Engineering and POS attacks in the Hotel Industry

March 21, 2016 | Jane Dotsenko

Think about your average hotel lobby on a busy day. Likely there will be ...

Exploit Kits for Drive-by Download Attacks

March 17, 2016 | Patrick Bedwell

Exploit Kits (EKs) are malicious code embedded in a website. They are ...

The Cybersecurity Skills Gap is Real, Now What?

March 16, 2016 | Admin

Industry estimates suggest more than one million unfilled security jobs exist ...

Buffer Overflow Attacks: Methods and Best Practices

March 16, 2016 | Garrett Gross

One of the best ways to improve IT security is for security specialists to ...

Why Securing Your Online Retail Presence Starts with Applications

March 15, 2016 | Jane Dotsenko

There is little doubt that the proliferation of mobile, cloud-based e-commerce ...