Fare Thee Well ModSecurity: End-of-Life and Last Commercial Rules Update for June 2024
June 20, 2024
A Fourteen-Year Journey Comes to an End In June 2010, Trustwave acquired Breach ...
Secure Access Service Edge: Another Multi-Tool for the SOC
June 17, 2024 | David Broggy
Over the years, several security defense architectures have merged into a ...
Search & Spoof: Abuse of Windows Search to Redirect to Malware
June 11, 2024 | Bernard Bautista
Trustwave SpiderLabs has detected a sophisticated malware campaign that ...
The Sentinel’s Watch: Building a Security Reporting Framework
June 10, 2024 | David Broggy
Imagine being on shift as the guard of a fortress. Your job is to identify ...
Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor
June 05, 2024 | Rodel Mendrez
During a recent client investigation, Trustwave SpiderLabs found a malicious ...
Threat Advisory: Snowflake Data Breach Impacts Its Clients
June 04, 2024
Executive Summary On May 20, 2024, Live Nation discovered and disclosed an ...
Cyber Exterminators: Monitoring the Shop Floor with OT Security
June 03, 2024 | David Broggy
Pressure is increasing on manufacturers to monitor their shop floors for ...
Important Security Defenses to Help Your CISO Sleep at Night
May 20, 2024 | David Broggy
This is Part 13 in my ongoing project to cover 30 cybersecurity topics in 30 ...
2024 Public Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies
May 14, 2024
Trustwave SpiderLabs’ 2024 Public Sector Threat Landscape: Trustwave Threat ...
How to Create the Asset Inventory You Probably Don't Have
May 13, 2024 | David Broggy
This is Part 12 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Guardians of the Gateway: Identity and Access Management Best Practices
May 06, 2024 | David Broggy
This is Part 10 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Protecting Zion: InfoSec Encryption Concepts and Tips
April 29, 2024 | David Broggy
This is Part 9 in my ongoing project to cover 30 cybersecurity topics in 30 ...
EDR – The Multi-Tool of Security Defenses
April 22, 2024 | David Broggy
This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 ...
The Invisible Battleground: Essentials of EASM
April 22, 2024 | David Broggy
Know your enemy – inside and out. External Attack Surface Management tools are ...
Fake Dialog Boxes to Make Malware More Convincing
April 17, 2024 | Ram Prakash
Let’s explore how SpiderLabs created and incorporated user prompts, ...
The Secret Cipher: Modern Data Loss Prevention Solutions
April 15, 2024 | David Broggy
This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 ...
CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway
April 12, 2024
UPDATE: Palo Alto Networks confirmed on Tuesday (4/16) that disabling device ...
CNAPP, CSPM, CIEM, CWPP – Oh My!
April 08, 2024 | David Broggy
We all know the cybersecurity industry loves its acronyms, but just because ...
Phishing Deception - Suspended Domains Reveal Malicious Payload for Latin American Region
April 05, 2024 | Karla Agregado
Recently, we observed a phishing campaign targeting the Latin American region. ...
Zero Trust Essentials
April 01, 2024 | David Broggy
This is Part 5 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Why We Should Probably Stop Visually Verifying Checksums
March 27, 2024 | Tom Neaves
Hello there! Thanks for stopping by. Let me get straight into it and start ...
Agent Tesla's New Ride: The Rise of a Novel Loader
March 26, 2024 | Bernard Bautista
Malware loaders, critical for deploying malware, enable threat actors to ...
Evaluating Your Security Posture: Security Assessment Basics
March 25, 2024 | David Broggy
This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Trustwave SpiderLabs: Artificial Intelligence Playing a Prime Role in BEC and Phishing Attacks
March 20, 2024
Criminals have historically been quick to embrace cutting-edge technology for ...
The Inevitable Threat: AI-Generated Email Attacks Delivered to Mailboxes
March 19, 2024 | Katrina Udquin
Generative AI exploded in popularity not too long ago but its influence on text ...
Cybersecurity Documentation Essentials
March 18, 2024 | David Broggy
This is Part 3 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Ukrainian Intelligence Claims Successful Compromise of the Russian Ministry of Defense
March 12, 2024 | Arthur Erzberger
On March 4, 2024, the Telegram channel of the Main Directorate of Intelligence ...
Cost Management Tips for Cyber Admins
March 11, 2024 | David Broggy
As anyone who has filled out an expense report can tell you, cost management is ...