Scattered LAPSUS$ Hunters: Anatomy of a Federated Cybercriminal Brand
November 04, 2025 | Serhii Melnyk
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from Trustwave, A LevelBlue Company.
Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files
September 05, 2025 | Tom Neaves
AI agents (utilizing LLMs and RAG) are being used within SOCs and SIEMS to both ...
Malicious Screen Connect Campaign Abuses AI-Themed Lures for Xworm Delivery
August 27, 2025 | Bolesław Szołtysik, Chris Tomboc, Serhii Melnyk
During a recent Advanced Continual Threat Hunt (ACTH) investigation, the ...
Trustwave SpiderLabs’ 2025 Risk Radar Report: Technology Sector
June 25, 2025
Explore key insights from Trustwave SpiderLabs' latest report on securing tech ...
The Blind Spots of Multi-Agent Systems: Why AI Collaboration Needs Caution
May 23, 2025 | Muhammad Ahmad
Multi-agent systems (MAS) are reshaping industries from IT services to ...
Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks
April 21, 2025 | Tom Neaves
I think you’ll agree with me that growth in the AI landscape is pretty full-on ...
Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)
March 24, 2025 | Tom Neaves
The concept of “principle of least privilege” has been around for a long time. ...
When User Input Lines Are Blurred: Indirect Prompt Injection Attack Vulnerabilities in AI LLMs
December 10, 2024 | Tom Neaves
It was a cold and wet Thursday morning, sometime in early 2006. There I was ...
How Threat Actors Conduct Election Interference Operations: An Overview
October 18, 2024 | Pauline Bolaños
The major headlines that arose from the three most recent US presidential ...
Shedding Light on Election Deepfakes
September 25, 2024 | Pauline Bolaños
Contrary to popular belief, deepfakes — AI-crafted audio files, images, or ...
Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media
September 13, 2024 | Jose Tozo
With the US election on the horizon, it’s a good time to explore the concept of ...
Sentinels of Ex Machina: Defending AI Architectures
August 05, 2024 | David Broggy
The introduction, adoption, and quick evolution of generative AI has raised ...
Clockwork Blue: Automating Security Defenses with SOAR and AI
July 01, 2024 | David Broggy
It’s impractical to operate security operations alone, using manual human ...
Scanning the Matrix: SIEM Best Practices
June 24, 2024 | David Broggy
(A thought from The Matrix: Neo likely used a SIEM before he took the red pill ...