The Russia-Ukraine Cyber War Part 4: Development in Group Attributions for Russian State Actors
March 07, 2025 | Pawel Knapczyk and Nikita Kazymirskyi
This is the final installment of Trustwave SpiderLabs Russia-Ukraine digital ...
A Deep Dive into Strela Stealer and how it Targets European Countries
March 06, 2025 | Dawid Nesterowicz
Infostealers have dominated the malware landscape due to the ease of threat ...
The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure
March 05, 2025 | Pawel Knapczyk and Nikita Kazymirskyi
This post is the third part of our blog series that tackles the Russia-Ukraine ...
2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector
February 26, 2025
2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: ...
The Russia-Ukraine Cyber War Part 2: Attacks Against Government Entities, Defense Sector, and Human Targets
February 25, 2025 | Pawel Knapczyk and Nikita Kazymirskyi
In the first part of Trustwave SpiderLabs’ Russia-Ukraine war blog series, we ...
The Russia-Ukraine Cyber War Part 1: Three Years of Cyber Warfare
February 20, 2025 | Pawel Knapczyk and Nikita Kazymirskyi
As the third anniversary of the start of the Russia-Ukraine war approaches, ...
The Rise of Email Marketing Platforms for Business Email Compromise Attacks
February 18, 2025 | Maria Katrina Udquin
In a statistical report published in September 2024 by the Federal Bureau of ...
Beyond the Chatbot: Meta Phishing with Fake Live Support
February 04, 2025 | Mike Casayuran and John Kevin Adriano
In a previous Trustwave SpiderLabs’ blog, we explored how cybercriminals ...
Cracking the Giant: How ODAT Challenges Oracle, the King of Databases
January 27, 2025 | Karl Biron
In the past decade, Oracle Database (Oracle DB) has reigned supreme in the ...
Trustwave SpiderLabs 2025 Trustwave Risk Radar Report: Energy and Utilities Sector
January 22, 2025
The energy sector plays a crucial role in national security by ensuring the ...
The New Face of Ransomware: Key Players and Emerging Tactics of 2024
January 21, 2025 | Serhii Melnyk
As we step into 2025, the high-impact, financially motivated ransomware ...
CVE-2024-55591: Fortinet FortiOS/FortiProxy Zero Day
January 14, 2025
In late November and December 2024, Arctic Wolf observed evidence of a mass ...
The Database Slayer: Deep Dive and Simulation of the Xbash Malware
January 14, 2025 | Karl Biron
In the world of malware, common ransomware schemes aim to take the data within ...
The State of Magecart: A Persistent Threat to E-Commerce Security
January 09, 2025 | Rodel Mendrez
Trustwave SpiderLabs first blogged about Magecart back in 2019; fast forward ...
Email Bombing: Why You Need to be Concerned
December 18, 2024 | Phil Hay
Over the last few months, the topic of email bombing has been brought to our ...
When User Input Lines Are Blurred: Indirect Prompt Injection Attack Vulnerabilities in AI LLMs
December 10, 2024 | Tom Neaves
It was a cold and wet Thursday morning, sometime in early 2006. There I was ...
CVE-2024-11477: 7-Zip Flaw Allows Remote Code Execution
November 27, 2024 | Pauline Bolaños
On November 20th, 2024, Zero Day Initiative (ZDI) researchers disclosed a ...
Rockstar 2FA Phishing-as-a-Service (PaaS): Noteworthy Email Campaigns
November 27, 2024 | Diana Solomon and John Kevin Adriano
Welcome to the second part of our investigation into the Rockstar kit, please ...
Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)
November 26, 2024 | Diana Solomon and John Kevin Adriano
Trustwave SpiderLabs has been actively monitoring the rise of ...
Lessons from a Honeypot with US Citizens’ Data
November 13, 2024 | Radoslaw Zdonczyk and Nikita Kazymirskyi
Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team ...
2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector
October 29, 2024
As the holiday shopping season approaches, the 2024 Trustwave Risk Radar ...
Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails
October 21, 2024 | Katrina Udquin
Introduction Previously, Trustwave SpiderLabs covered a massive fake order spam ...
How Threat Actors Conduct Election Interference Operations: An Overview
October 18, 2024 | Pauline Bolaños
The major headlines that arose from the three most recent US presidential ...
Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)
October 17, 2024 | Karl Biron
Introduction In the perpetually evolving field of cybersecurity, new threats ...
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader
October 08, 2024 | Cris Tomboc and King Orande
Trustwave's Threat Intelligence team has discovered a new malware dubbed ...
What We Know So Far About Zero-Day CUPS Vulnerabilities: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177
September 30, 2024
On September 26, 2024, security researcher Simone Margaritellidisclosed the ...
Shedding Light on Election Deepfakes
September 25, 2024 | Pauline Bolaños
Contrary to popular belief, deepfakes — AI-crafted audio files, images, or ...
HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content
September 24, 2024 | Mike Casayuran
HTML smuggling techniques have been around for quite some time. A previous ...