Fare Thee Well ModSecurity: End-of-Life and Last Commercial Rules Update for June 2024

June 20, 2024

A Fourteen-Year Journey Comes to an End In June 2010, Trustwave acquired Breach ...

Secure Access Service Edge: Another Multi-Tool for the SOC

June 17, 2024 | David Broggy

Over the years, several security defense architectures have merged into a ...

Search & Spoof: Abuse of Windows Search to Redirect to Malware

June 11, 2024 | Bernard Bautista

Trustwave SpiderLabs has detected a sophisticated malware campaign that ...

The Sentinel’s Watch: Building a Security Reporting Framework

June 10, 2024 | David Broggy

Imagine being on shift as the guard of a fortress. Your job is to identify ...

Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor

June 05, 2024 | Rodel Mendrez

During a recent client investigation, Trustwave SpiderLabs found a malicious ...

Threat Advisory: Snowflake Data Breach Impacts Its Clients

June 04, 2024

Executive Summary On May 20, 2024, Live Nation discovered and disclosed an ...

Cyber Exterminators: Monitoring the Shop Floor with OT Security

June 03, 2024 | David Broggy

Pressure is increasing on manufacturers to monitor their shop floors for ...

Important Security Defenses to Help Your CISO Sleep at Night

May 20, 2024 | David Broggy

This is Part 13 in my ongoing project to cover 30 cybersecurity topics in 30 ...

2024 Public Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies

May 14, 2024

Trustwave SpiderLabs’ 2024 Public Sector Threat Landscape: Trustwave Threat ...

How to Create the Asset Inventory You Probably Don't Have

May 13, 2024 | David Broggy

This is Part 12 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Guardians of the Gateway: Identity and Access Management Best Practices

May 06, 2024 | David Broggy

This is Part 10 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Protecting Zion: InfoSec Encryption Concepts and Tips

April 29, 2024 | David Broggy

This is Part 9 in my ongoing project to cover 30 cybersecurity topics in 30 ...

EDR – The Multi-Tool of Security Defenses

April 22, 2024 | David Broggy

This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 ...

The Invisible Battleground: Essentials of EASM

April 22, 2024 | David Broggy

Know your enemy – inside and out. External Attack Surface Management tools are ...

Fake Dialog Boxes to Make Malware More Convincing

April 17, 2024 | Ram Prakash

Let’s explore how SpiderLabs created and incorporated user prompts, ...

The Secret Cipher: Modern Data Loss Prevention Solutions

April 15, 2024 | David Broggy

This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 ...

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway

April 12, 2024

UPDATE: Palo Alto Networks confirmed on Tuesday (4/16) that disabling device ...

CNAPP, CSPM, CIEM, CWPP – Oh My!

April 08, 2024 | David Broggy

We all know the cybersecurity industry loves its acronyms, but just because ...

Phishing Deception - Suspended Domains Reveal Malicious Payload for Latin American Region

April 05, 2024 | Karla Agregado

Recently, we observed a phishing campaign targeting the Latin American region. ...

Zero Trust Essentials

April 01, 2024 | David Broggy

This is Part 5 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Why We Should Probably Stop Visually Verifying Checksums

March 27, 2024 | Tom Neaves

Hello there! Thanks for stopping by. Let me get straight into it and start ...

Agent Tesla's New Ride: The Rise of a Novel Loader

March 26, 2024 | Bernard Bautista

Malware loaders, critical for deploying malware, enable threat actors to ...

Evaluating Your Security Posture: Security Assessment Basics

March 25, 2024 | David Broggy

This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Trustwave SpiderLabs: Artificial Intelligence Playing a Prime Role in BEC and Phishing Attacks

March 20, 2024

Criminals have historically been quick to embrace cutting-edge technology for ...

The Inevitable Threat: AI-Generated Email Attacks Delivered to Mailboxes

March 19, 2024 | Katrina Udquin

Generative AI exploded in popularity not too long ago but its influence on text ...

Cybersecurity Documentation Essentials

March 18, 2024 | David Broggy

This is Part 3 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Ukrainian Intelligence Claims Successful Compromise of the Russian Ministry of Defense

March 12, 2024 | Arthur Erzberger

On March 4, 2024, the Telegram channel of the Main Directorate of Intelligence ...

Cost Management Tips for Cyber Admins

March 11, 2024 | David Broggy

As anyone who has filled out an expense report can tell you, cost management is ...