The Attack of the Chameleon Phishing Page
Recently, we encountered an interesting phishing webpage that caught our interest because it acts ...
Read MoreRecently, we encountered an interesting phishing webpage that caught our interest because it acts ...
Read MoreWe were once newcomers to the security research field and one of the most annoying problems we ran ...
Read MoreWhen a company implements multifactor authentication, the organization is usually confident that ...
Read MoreUpdate: March 9: Additional phishing emails have been sighted by Trustwave SpiderLabs researchers ...
Read MoreFeb. 28 Update: The latest economic sanctions imposed upon Russia could inspire that nation or ...
Read MoreSummary A stored cross-site scripting vulnerability, tracked as CVE-2021-45919, was identified in ...
Read MoreDuring a recent engagement Trustwave SpiderLabs discovered a vulnerability (CVE-2021-45901) within ...
Read MoreSummary: During an investigation of a malware campaign, I discovered that multiple emails were ...
Read MoreSummary of Trustwave Actions (updated 1/26/2022): Trustwave security and engineering teams became ...
Read MoreThe Trustwave Threat Hunting team has authored a practical guide to help the cybersecurity ...
Read MoreIn the wake of the takedown of the REvil/Sodinokibi ransomware gang by the Russian Federal Security ...
Read MoreSince the return of the Qakbot Trojan in early September 2021, especially through SquirrelWaffle ...
Read MoreRecently, we observed a malware spam campaign leveraging the current COVID-19 situation. The emails ...
Read MoreUpdates: Dec. 29: Updated to cover three additional CVEs: CVE-2021-4104, CVE-2021-44832, and ...
Read MoreThrough the active Dark Web research that Trustwave SpiderLabs conducts for its clients, we have ...
Read MoreModSecurity is an open-source WAF engine maintained by Trustwave. This blog post discusses an issue ...
Read MoreOverview CrypKey (https://www.crypkey.com/) is a third-party licensing service for Windows that ...
Read MoreIn Part 1 of our BlackByte ransomware analysis, we covered the execution flow of the first stage ...
Read MoreEdge Services It’s well known that we just don’t put services or devices on the edge of the ...
Read MoreThe typical process when scoping a penetration test is to get a list of targets from the client, ...
Read MoreThe security landscape is always changing. New features are coming out all the time, but often ...
Read MoreHere we are in August and it's Patch Tuesday once more. It's another light month with only 9 CVEs ...
Read MoreTrustwave SpiderLabs recently undertook a survey of some 100 popular WordPress plugins for possible ...
Read MoreSummary Secret-Chats in Telegram use end-to-end encryption, which is meant for people who are ...
Read MoreAnyone who has ever read a vulnerability scan report will know that scanners often include a large ...
Read MoreON24 presenter mode requires you to install a plugin that is used to share your screen. For the ...
Read MoreWe're a little over halfway through the year now as July's Patch Tuesday is released and it's been ...
Read More