• SL-Logo-White

    With insight gathered from our advanced security research, penetration testing and incident response investigations, Trustwave's elite security team, SpiderLabs®, understands how attackers think and operate. We apply our deep, specialized knowledge to every customer engagement and use that intelligence to fuel our managed security services and technologies.


  • Businesses worldwide depend on the global SpiderLabs team at Trustwave to keep them ahead of the latest security threats.

    Our security breach investigations, malware reverse-engineering projects, millions of scans, thousands of penetration tests, leadership of open-source security projects and contributions to the security community have established Trustwave SpiderLabs as world-renowned experts on the past, present and future of security.

    The SpiderLabs team at Trustwave includes security and penetration testers, incident responders, forensic investigators, malware reversers, security researchers, published authors and sought-after speakers.

  • icon-circle-white-user


    specialized security experts


    9 Million

    web application attacks researched



    penetration tests each year

  • Trustwave SpiderLabs is known for:


    Incident readiness and data breach forensic investigations


    Threat intelligence that fuels industry-leading managed security services and technologies


    Innovative security research and major threat discoveries


    Contributions to the community including our annual Global Security Report, the SpiderLabs blog and the open-source ModSecurity web application firewall.


    Trustwave Global Security Report

    Read the annual reports, based on Trustwave SpiderLabs' threat intelligence, research and investigations.

How We Work

  • Intelligent adversaries, on your side

    Our experts have extensive experience using tools and techniques that rival the ingenuity of today’s advanced attackers and their methods allowing us to replicate the types of attacks your business needs to defend itself against. Our continual, impassioned research and experience investigating real world attacks allow us to anticipate tomorrow's threats. We apply those insights to Trustwave services to enable proactive threat and vulnerability management for our customers. Our security testing unearths exactly how adversaries think and act, allowing us to demonstrate how an attacker gains unauthorized access to your businesses' sensitive systems and data, so you know exactly where to focus your investment and time in protecting against actual intrusions.

  • SL-Photo-5

    Our forensics team investigates data breaches

    Responding to a data-loss incident quickly and in an organized manner is paramount in containing a breach, limiting exposure, stemming losses and preserving evidence. The costs of such an incident include not only lost data and potential fines but also brand damage and embarrassment, plus time and resources spent cleaning up the mess. Our forensic investigators determine the root cause of breaches and properly collect, handle and maintain the chain-of-custody of evidence to support litigation should you choose to pursue it. And like we have for countless other businesses, we can help you respond efficiently to manage the ramifications of a data compromise. Our expert investigators are also available to lend their expertise in training your staff to react accordingly to a security breach.

    We help you fortify your applications and products

    Close to four out of five IT professionals admit to being pressured to roll out insecure projects, including applications and new products. You probably understand the risks inherent in going to market with a potentially vulnerable product. You want to be proactive to protect not only your organization but also your customers and partners. Our range of security testing and review services make sure you’ve done your due diligence wherever you might be in the product development lifecycle.

  • Innovative research is at our core

    Our world-renowned security research team studies attackers’ latest techniques to better understand both what’s happening now and what methods and vectors will challenge businesses next. The team makes Trustwave services and products more effective by analyzing recent attacks, threats and vulnerabilities, and then creating update detection rules for dozens of Trustwave solutions. In addition to their daily duties investigating malware, web clients and servers, email, databases, applications and major vulnerabilities, our researchers are sought-after speakers, trusted media sources, published authors and leaders of major industry projects.

  • Threat intelligence powers our services

    Enhanced by our applied research and experiences from the field, Trustwave’s large, global client footprint offers us unmatched visibility into security threats. We gain key insights from our analysis of hundreds of data breach investigations, threat intelligence from our global security operations centers, telemetry from security technologies and industry-leading security research. Finally, we make Trustwave managed services more effective by feeding them with our proprietary threat intelligence.

  • SL-Photo-3

    Our experts are yours

    Trustwave offers you access to our personal information security advisors, serving as your one-on-one contacts to keep your business safer and help ensure that you have the services, technologies and tools you need to meet your future business goals. For example, maybe you don't have the resources to build an internal security testing team for all of your applications, databases and networks. Trustwave augments your internal security resources by providing a combination of tools-based testing with the expertise of the industry’s top penetration testers to provide a range of options to identify vulnerabilities so you can better manage them.

  • SL-Photo-9

    We hire top talent

    Our SpiderLabs experts are distributed across ten countries and include security and penetration testers, incident responders, forensic investigators, malware reverse-engineers, security researchers, published authors and sought-after speakers with an average of more than a dozen years in the business. We recruit and hire top members of the community who speak regularly at industry events such as Black Hat and DefCon and make pivotal contributions to the information security community. If you’re interested in working at Trustwave SpiderLabs, check out our careers page. We are always on the hunt for the top talent of today and the rock stars of the future.

  • SL-Photo-4

    We offer insightful stats and analysis

    Based on our proprietary threat intelligence and insights from our data breach investigations, the annual Trustwave Global Security Report reveals information about, what information attackers want and how they obtain it. SpiderLabs offers this free resource full of insightful stats and threat trends, as well as actionable advice to help businesses improve their security programs. We also feature novel research, attack and penetration techniques, and trend analysis on the SpiderLabs blog, and our findings are regularly featured in major media outlets worldwide.

    We lead security community projects

    Trustwave is the primary custodian of the open-source ModSecurity web application firewall, the most widely deployed in the world. We’re committed to supporting ModSecurity and its diverse and widespread user base. Our team also contributes to and develops community-revered tools, such as those hosted at our GitHub project page, the OWASP ModSecurity Core Rule Set project and the OWASP Web Application Security Consortium Web Hacking Incident Database (WHID) project.


    • Managed security services for scanning, testing and remediation of vulnerabilities.

      • Find, fix and remediate
      • Spanning applications, databases and networks
      • Mix automated scanning with expert testing
      • For mission-critical systems on down
    • Offensive security testing delivered on time, on budget, on demand.

      • Flexible testing options
      • Clearly-defined pricing and testing tiers
      • Delivered by SpiderLabs penetration testers
    • Preparation for data breaches and response to compromises if they occur.

      • Simulated exercises
      • Forensic data acquisition and analysis
      • Malware reverse engineering
      • Containment and remediation


  • Documents

  • SpiderLabs Blog

    Using IPv6 to Bypass Security

    Introduction All too often when we conduct pen tests against organizations we find a robust security posture against their Iv4 infrastructure. They lock down services, use a host-based firewall and generally follow best practice security guidelines. However, these same organizations...

    Patch Tuesday, April 2018

    April's Patch Tuesday didn't let up much compared to March. Overall April brings with it patches for 70 vulnerabilities including 27 rated as "Critical", 42 rated as "Important" and 1 rated as "Moderate". Along with most of our "usual suspects",...

    Crypter-as-a-Service Helps jRAT Fly Under The Radar

    (Contributor: Dr. Fahim Abbasi and Phil Hay) In this blog, we provide an analysis of a Java-based malware sample circulated via spam, that leverages Crypter services hosted on the dark web to create mutations to evade detection. We observed a...

    Patch Tuesday, March 2018

    March is coming in like a lion with this Patch Tuesday. The release patches 73 CVEs and includes the perennial rollup advisory for Adobe Flash. Fifteen of the 73 patched CVEs are rated as "Critical", 56 of the CVEs are...