Email Bombing: Why You Need to be Concerned

When User Input Lines Are Blurred: Indirect Prompt Injection Attack Vulnerabilities in AI LLMs

It was a cold and wet Thursday morning, sometime in early 2006. There I was sitting at the very top ...

Read More

CVE-2024-11477: 7-Zip Flaw Allows Remote Code Execution

On November 20th, 2024, Zero Day Initiative (ZDI) researchers disclosed a critical flaw in 7-Zip.

Read More

Rockstar 2FA Phishing-as-a-Service (PaaS): Noteworthy Email Campaigns

Welcome to the second part of our investigation into the Rockstar kit, please check out part one ...

Read More

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) ...

Read More

Lessons from a Honeypot with US Citizens’ Data

Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work ...

Read More

2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector

As the holiday shopping season approaches, the 2024 Trustwave Risk Radar Report: Retail Sector ...

Read More

Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails

Introduction Previously, Trustwave SpiderLabs covered a massive fake order spam scheme that ...

Read More

How Threat Actors Conduct Election Interference Operations: An Overview

The major headlines that arose from the three most recent US presidential election cycles ...

Read More

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)

Introduction In the perpetually evolving field of cybersecurity, new threats materialize daily. ...

Read More

Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Trustwave's Threat Intelligence team has discovered a new malware dubbed Pronsis Loader, with its ...

Read More

What We Know So Far About Zero-Day CUPS Vulnerabilities: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177

On September 26, 2024, security researcher Simone Margaritellidisclosed the details of four ...

Read More

Shedding Light on Election Deepfakes

Contrary to popular belief, deepfakes — AI-crafted audio files, images, or videos that depict ...

Read More

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content

HTML smuggling techniques have been around for quite some time. A previous Trustwave SpiderLabs’ ...

Read More

Why Do Criminals Love Phishing-as-a-Service Platforms?

Phishing-as-a-Service (PaaS) platforms have become the go-to tool for cybercriminals, to launch ...

Read More

Spam With A Political Twist: Fraudsters Are Exploiting The Election Season

The US election is less than 70 days away and threat actors are busy crafting malicious spam that ...

Read More

Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media

With the US election on the horizon, it’s a good time to explore the concept of social media ...

Read More

Trustwave SpiderLabs Research: 20% of Ransomware Attacks in Financial Services Target Banking Institutions

The 2024 Trustwave Risk Radar Report: Financial Services Sector underscores the escalating threat ...

Read More

Exploring an Experimental Windows Kernel Rootkit in Rust

Around two years ago, memN0ps took the initiative to create one of the first publicly available ...

Read More

Hypervisor Development in Rust for Security Researchers (Part 1)

In the ever-evolving field of information security, curiosity and continuous learning drive ...

Read More

Your Money or Your Data: Ransomware Readiness Planning

Today’s blog installment brings us to the end of our 30-week journey that covered 30 cybersecurity ...

Read More

Exposed and Encrypted: Inside a Mallox Ransomware Attack

Recently, a client enlisted the support of Trustwave to investigate an unauthorized access incident ...

Read More

The Willy Wonka World of Application Security Defenses

One doesn’t have to be a magician to understand how to track the hundreds, if not thousands, of ...

Read More

The Bug Stops Here: Using DevSecOps Workflows for Pest-Free Applications

Developers and cybersecurity have an interesting relationship. Developers have no problem with ...

Read More

Deep Dive and Simulation of a MariaDB RCE Attack: CVE-2021-27928

In early 2021, a new vulnerability, identified as CVE-2021-27928, was discovered and published. It ...

Read More

Trustwave Rapid Response: Mitigate Windows TCP/IP RCE Vulnerability (CVE-2024-38063)

Microsoft has disclosed a critical (CVSS 9.8) TCP/IP remote code execution (RCE) vulnerability that ...

Read More

The Art of Deception: Turning the Tables on Attackers with Active Defenses

Once an attacker enters your network, one of their first actions will be to try and hide their ...

Read More

Sentinels of Ex Machina: Defending AI Architectures

The introduction, adoption, and quick evolution of generative AI has raised multiple questions ...

Read More