A Trump Sex Video? No, It's a RAT!
While reviewing our spam traps, a particular campaign piqued our interest primarily because the ...
Read MoreWhile reviewing our spam traps, a particular campaign piqued our interest primarily because the ...
Read MoreYes! It’s that time of the year again! The time for celebrating our traditions, a time of giving, ...
Read MoreUPDATES This blog post was updated March 17 to include information on new Trustwave IDS updates.
Read MoreOn the 30th of October, D-Link published a support announcement and released a new firmware to ...
Read MoreCybercriminals are leveraging reputable cloud services to relay scam email messages to their ...
Read MoreOverview With the prevalence of IoT devices flooding the mainstream marketplace, we tend to see a ...
Read MoreUpdate With the new information and developments released by FireEye, we have published a new blog ...
Read MoreOverview During observation of WinZip 24 network communications, I've noticed that it sends update ...
Read MoreThis is part three of our Schneider Electric series. You can read part one here and part two here.
Read MoreDecember's Patch Tuesday is here and, typical for the end of the year, it's a light month with only ...
Read MoreLast week we released an advisory about an SMS app called GO SMS Pro. Media files sent via text in ...
Read MoreThe GO SMS Pro application is a popular messenger app with over 100 million downloads and was ...
Read MoreThis is part 2 of a two-part series. You can read part 1 here.
Read MoreSummary: Trustwave identified a significant malicious campaign on mandatory tax invoice software, ...
Read MoreVoting in the U.S. elections started recently and there is a real concern over interference and ...
Read MoreOn October 13th, 2020, Microsoft released a patch for a critical vulnerability (CVE-2020-16898) in ...
Read MoreDirectly preceding GoldenSpy, another malware family was used to covertly access the networks of ...
Read MoreOctober's Patch Tuesday is upon us and with it comes patches for 102 CVEs. This release includes 13 ...
Read MoreA URL can be completely valid, yet still misleading. In this blog, we will present another ...
Read MoreZeroLogon has quickly become popular and well known because of multiple proofs of concept and ...
Read MoreIntroduction Today I'd like to discuss two information disclosure vulnerabilities that occur in SAP ...
Read MoreOn September 14th, researchers at security firm Secura published a white paper detailing a complete ...
Read MoreThis post is part one of a two part series. You can read part two here.
Read MoreA few days ago a new version of THE most common exploit kit was released. Unlike most exploit kit ...
Read MoreModSecurity is an open-source Web Application Firewall (WAF) engine maintained by Trustwave. The ...
Read MoreThe Qua or Quaverse Remote Access Trojan (QRAT) is a Java-based RAT that can be used to gain ...
Read MoreI’ve recently blogged about a shared memory vulnerability in Cisco WebEx Meetings Client on Windows ...
Read More