When User Input Lines Are Blurred: Indirect Prompt Injection Attack Vulnerabilities in AI LLMs

CVE-2024-11477: 7-Zip Flaw Allows Remote Code Execution

On November 20th, 2024, Zero Day Initiative (ZDI) researchers disclosed a critical flaw in 7-Zip.

Read More

Rockstar 2FA Phishing-as-a-Service (PaaS): Noteworthy Email Campaigns

Welcome to the second part of our investigation into the Rockstar kit, please check out part one ...

Read More

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) ...

Read More

Lessons from a Honeypot with US Citizens’ Data

Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work ...

Read More

Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails

Introduction Previously, Trustwave SpiderLabs covered a massive fake order spam scheme that ...

Read More

How Threat Actors Conduct Election Interference Operations: An Overview

The major headlines that arose from the three most recent US presidential election cycles ...

Read More

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)

Introduction In the perpetually evolving field of cybersecurity, new threats materialize daily. ...

Read More

Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Trustwave's Threat Intelligence team has discovered a new malware dubbed Pronsis Loader, with its ...

Read More

What We Know So Far About Zero-Day CUPS Vulnerabilities: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177

On September 26, 2024, security researcher Simone Margaritellidisclosed the details of four ...

Read More

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content

HTML smuggling techniques have been around for quite some time. A previous Trustwave SpiderLabs’ ...

Read More

Spam With A Political Twist: Fraudsters Are Exploiting The Election Season

The US election is less than 70 days away and threat actors are busy crafting malicious spam that ...

Read More

Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media

With the US election on the horizon, it’s a good time to explore the concept of social media ...

Read More

Exploring an Experimental Windows Kernel Rootkit in Rust

Around two years ago, memN0ps took the initiative to create one of the first publicly available ...

Read More

Hypervisor Development in Rust for Security Researchers (Part 1)

In the ever-evolving field of information security, curiosity and continuous learning drive ...

Read More

Deep Dive and Simulation of a MariaDB RCE Attack: CVE-2021-27928

In early 2021, a new vulnerability, identified as CVE-2021-27928, was discovered and published. It ...

Read More

Trustwave Rapid Response: Mitigate Windows TCP/IP RCE Vulnerability (CVE-2024-38063)

Microsoft has disclosed a critical (CVSS 9.8) TCP/IP remote code execution (RCE) vulnerability that ...

Read More

Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor

During a recent client investigation, Trustwave SpiderLabs found a malicious version of the ...

Read More

Cyber Exterminators: Monitoring the Shop Floor with OT Security

Pressure is increasing on manufacturers to monitor their shop floors for malicious activity to ...

Read More

Fake Dialog Boxes to Make Malware More Convincing

Let’s explore how SpiderLabs created and incorporated user prompts, specifically Windows dialog ...

Read More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway

UPDATE: Palo Alto Networks confirmed on Tuesday (4/16) that disabling device telemetry is no longer ...

Read More