Scattered LAPSUS$ Hunters: Anatomy of a Federated Cybercriminal Brand

November 04, 2025 | Serhii Melnyk

Hunter

Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files

September 05, 2025 | Tom Neaves

AI agents (utilizing LLMs and RAG) are being used within SOCs and SIEMS to both ...

Malicious Screen Connect Campaign Abuses AI-Themed Lures for Xworm Delivery

August 27, 2025 | Bolesław Szołtysik, Chris Tomboc, Serhii Melnyk

During a recent Advanced Continual Threat Hunt (ACTH) investigation, the ...

Trustwave SpiderLabs’ 2025 Risk Radar Report: Technology Sector

June 25, 2025

Explore key insights from Trustwave SpiderLabs' latest report on securing tech ...

The Blind Spots of Multi-Agent Systems: Why AI Collaboration Needs Caution

May 23, 2025 | Muhammad Ahmad

Multi-agent systems (MAS) are reshaping industries from IT services to ...

Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks

April 21, 2025 | Tom Neaves

I think you’ll agree with me that growth in the AI landscape is pretty full-on ...

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)

March 24, 2025 | Tom Neaves

The concept of “principle of least privilege” has been around for a long time. ...

When User Input Lines Are Blurred: Indirect Prompt Injection Attack Vulnerabilities in AI LLMs

December 10, 2024 | Tom Neaves

It was a cold and wet Thursday morning, sometime in early 2006. There I was ...

How Threat Actors Conduct Election Interference Operations: An Overview

October 18, 2024 | Pauline Bolaños

The major headlines that arose from the three most recent US presidential ...

Shedding Light on Election Deepfakes

September 25, 2024 | Pauline Bolaños

Contrary to popular belief, deepfakes — AI-crafted audio files, images, or ...

Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media

September 13, 2024 | Jose Tozo

With the US election on the horizon, it’s a good time to explore the concept of ...

Sentinels of Ex Machina: Defending AI Architectures

August 05, 2024 | David Broggy

The introduction, adoption, and quick evolution of generative AI has raised ...

Clockwork Blue: Automating Security Defenses with SOAR and AI

July 01, 2024 | David Broggy

It’s impractical to operate security operations alone, using manual human ...

Scanning the Matrix: SIEM Best Practices

June 24, 2024 | David Broggy

(A thought from The Matrix: Neo likely used a SIEM before he took the red pill ...