Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers

E-Commerce Security Woes: Millions of Stolen User Sessions Found for Sale

The booming e-commerce industry, with its projected $5 trillion in sales by 2025, has become a ...

Read More

Threat Actors Zero in on Retailers as the Holiday Shopping Season Approaches

Trustwave SpiderLabs on October 29 will launch its second deeply researched look into the threats ...

Read More

Combating Misinformation and Cyber Threats to Secure the 2024 US Election

As we near the 2024 election, safeguarding the integrity of our democratic process is of paramount ...

Read More

Strengthening Email Security: DOJ Disrupts Russian Spear-Phishing Campaign

The need for an iron-clad email security solution is once again making headlines.

Read More

Analyzing Latrodectus: The New Face of Malware Loaders

This report is the latest in a series that will delve into the deep research the Trustwave ...

Read More

ALPHV BlackCat Ransomware: A Technical Deep Dive and Mitigation Strategies

ALPHV, also known as BlackCat or Noberus, is a sophisticated ransomware group targeting critical ...

Read More

Incident Response Testing: An Australian Perspective

In today's rapidly evolving digital landscape, organizations must be prepared for the inevitable ...

Read More

Protecting Patient Safety: Trustwave's Role in Healthcare Cybersecurity

The healthcare industry's digital transformation has brought unprecedented advancements in patient ...

Read More

Trustwave Data Reveals HTML Attachments, QR Codes, and BEC as Top Email Attack Vectors

The Trustwave SpiderLabs team regularly collects a trove of data while protecting clients from ...

Read More

Defending Healthcare: Trustwave’s Dedication to Fight Cyber Threats to Patient Safety

Hospitals face a challenging dilemma: delivering the highest quality of medical care while ...

Read More

Harris-Trump Presidential Election: Looking at the Threats and Cybersecurity Challenges

With less than three months to go until the 2024 US presidential election and with possible ...

Read More

Placing Threat Groups Under a Microscope: Lapsus$

This report is the first in a series of blogs that will delve into the deep research the SpiderLabs ...

Read More

CISA-FBI Issue Security Warning for Chinese-Manufactured Drones

Drones are becoming ubiquitous. They are sold as toys, used in industry, and as weapons of war, so ...

Read More

Trustwave SpiderLabs: SYS01 and Rilide Linked to Same Actor

Drawing on extensive proprietary research, Trustwave SpiderLabs believes the threat actors behind ...

Read More

Is it Time to Rethink Your Security Stack?

The cybersecurity threat landscape is constantly evolving, requiring organizations to regularly ...

Read More

How Cybercriminals Use Breaking News for Phishing Attacks

Trustwave SpiderLabs issued a warning that threat actors may attempt to take advantage of ...

Read More

Trustwave Response: CrowdStrike Falcon Outage Update

Trustwave is proactively assessing and monitoring our clients who may have been impacted by ...

Read More

Understanding the Impact of AI on Data Privacy

The world is just beginning to understand how the intersection of artificial intelligence (AI) and ...

Read More

Trustwave SpiderLabs: The Unique Factors that Make Professional Services a Target

Trustwave SpiderLabs has put together nine vertical threat reports over the past 12 months, but in ...

Read More

CDK Global Cyber Incident Shows the Need for Better Supply Chain Security

CDK Global, a company that provides software for thousands of auto dealers, was hit by back-to-back ...

Read More

How Deepfakes May Impact Upcoming Elections Worldwide

The common fear regarding election interference is that a threat actor will gain access to either ...

Read More

How Trustwave Protects Your Databases in the Wake of Recent Healthcare Data Breaches

The recent cyberattack on Ascension Medical, Change Healthcare and several UK hospitals is a stark ...

Read More

How Managed Detection and Response Helps Protect Against Threats from Cloud Sprawl

As businesses continue to rely on cloud services for all sorts of applications, computing, and ...

Read More

911 S5 Botnet Operation Disruption Highlights the Need for MDR and Email Security

A major botnet operation that controlled an estimated 19 million IP addresses and was responsible ...

Read More

8 Reasons to Conduct Regular Vulnerability Scans

Vulnerability scanning is a critical component of any robust Offensive Security strategy. When ...

Read More

ChatGPT: A Tool for Attackers and Defenders

ChatGPT impresses everyone with its writing capabilities; however, its proficiency in understanding ...

Read More

Growing Attack Surfaces Highlight the Need for Managed Detection and Response Services

One reason organizations have difficulty defending against cyber threats is their attack surfaces ...

Read More