Unraveling Phishing Campaigns Flagged by Trustwave’s URL Scanner

August 28, 2025 | Karla Agregado

Hunter

A Deep-Rooted Infestation: How the ILOVEYOU Bug Continues its Legacy in Modern Worms

May 02, 2025 | Pauline Bolaños

A quarter century ago, a former computer science student from the Philippines ...

Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks

April 10, 2025 | Bernard Bautista and Kevin Adriano

Ever thought an image file could be part of a cyber threat? The Trustwave ...

Tycoon2FA New Evasion Technique for 2025

April 10, 2025 | Rodel Mendrez

The Tycoon 2FA phishing kit has adopted several new evasion techniques aimed at ...

The Rise of Email Marketing Platforms for Business Email Compromise Attacks

February 18, 2025 | Maria Katrina Udquin

In a statistical report published in September 2024 by the Federal Bureau of ...

Beyond the Chatbot: Meta Phishing with Fake Live Support

February 04, 2025 | Mike Casayuran and John Kevin Adriano

In a previous Trustwave SpiderLabs’ blog, we explored how cybercriminals ...

Email Bombing: Why You Need to be Concerned

December 18, 2024 | Phil Hay

Over the last few months, the topic of email bombing has been brought to our ...

Rockstar 2FA Phishing-as-a-Service (PaaS): Noteworthy Email Campaigns

November 27, 2024 | Diana Solomon and John Kevin Adriano

Welcome to the second part of our investigation into the Rockstar kit, please ...

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

November 26, 2024 | Diana Solomon and John Kevin Adriano

Trustwave SpiderLabs has been actively monitoring the rise of ...

2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector

October 29, 2024

As the holiday shopping season approaches, the 2024 Trustwave Risk Radar ...

Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails

October 21, 2024 | Katrina Udquin

Introduction Previously, Trustwave SpiderLabs covered a massive fake order spam ...

Shedding Light on Election Deepfakes

September 25, 2024 | Pauline Bolaños

Contrary to popular belief, deepfakes — AI-crafted audio files, images, or ...

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content

September 24, 2024 | Mike Casayuran

HTML smuggling techniques have been around for quite some time. A previous ...

Why Do Criminals Love Phishing-as-a-Service Platforms?

September 23, 2024 | Rodel Mendrez

Phishing-as-a-Service (PaaS) platforms have become the go-to tool for ...

Spam With A Political Twist: Fraudsters Are Exploiting The Election Season

September 17, 2024 | Katrina Udquin

The US election is less than 70 days away and threat actors are busy crafting ...

Search & Spoof: Abuse of Windows Search to Redirect to Malware

June 11, 2024 | Bernard Bautista

Trustwave SpiderLabs has detected a sophisticated malware campaign that ...