Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks

April 21, 2025 | Tom Neaves

I think you’ll agree with me that growth in the AI landscape is pretty full-on ...

Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks

April 10, 2025 | Bernard Bautista and Kevin Adriano

Ever thought an image file could be part of a cyber threat? The Trustwave ...

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

March 20, 2025 | Karl Biron

In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your ...

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1

March 19, 2025 | Karl Biron

Picture this: an always-awake, never-tired, high-speed librarian that instantly ...

Resurgence of a Fake Captcha Malware Campaign

March 12, 2025 | Reegun Jayapaul

During an Advanced Continual Threat Hunt (ACTH) investigation in early February ...

The Russia-Ukraine Cyber War Part 4: Development in Group Attributions for Russian State Actors

March 07, 2025 | Pawel Knapczyk and Nikita Kazymirskyi

This is the final installment of Trustwave SpiderLabs Russia-Ukraine digital ...

A Deep Dive into Strela Stealer and how it Targets European Countries

March 06, 2025 | Dawid Nesterowicz

Infostealers have dominated the malware landscape due to the ease of threat ...

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure

March 05, 2025 | Pawel Knapczyk and Nikita Kazymirskyi

This post is the third part of our blog series that tackles the Russia-Ukraine ...

2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector

February 26, 2025

2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: ...

The Russia-Ukraine Cyber War Part 2: Attacks Against Government Entities, Defense Sector, and Human Targets

February 25, 2025 | Pawel Knapczyk and Nikita Kazymirskyi

In the first part of Trustwave SpiderLabs’ Russia-Ukraine war blog series, we ...

The Russia-Ukraine Cyber War Part 1: Three Years of Cyber Warfare

February 20, 2025 | Pawel Knapczyk and Nikita Kazymirskyi

As the third anniversary of the start of the Russia-Ukraine war approaches, ...

The Rise of Email Marketing Platforms for Business Email Compromise Attacks

February 18, 2025 | Maria Katrina Udquin

In a statistical report published in September 2024 by the Federal Bureau of ...

Beyond the Chatbot: Meta Phishing with Fake Live Support

February 04, 2025 | Mike Casayuran and John Kevin Adriano

In a previous Trustwave SpiderLabs’ blog, we explored how cybercriminals ...

Cracking the Giant: How ODAT Challenges Oracle, the King of Databases

January 27, 2025 | Karl Biron

In the past decade, Oracle Database (Oracle DB) has reigned supreme in the ...

Trustwave SpiderLabs 2025 Trustwave Risk Radar Report: Energy and Utilities Sector

January 22, 2025

The energy sector plays a crucial role in national security by ensuring the ...

The New Face of Ransomware: Key Players and Emerging Tactics of 2024

January 21, 2025 | Serhii Melnyk

As we step into 2025, the high-impact, financially motivated ransomware ...

CVE-2024-55591: Fortinet FortiOS/FortiProxy Zero Day

January 14, 2025

In late November and December 2024, Arctic Wolf observed evidence of a mass ...

The State of Magecart: A Persistent Threat to E-Commerce Security

January 09, 2025 | Rodel Mendrez

Trustwave SpiderLabs first blogged about Magecart back in 2019; fast forward ...

When User Input Lines Are Blurred: Indirect Prompt Injection Attack Vulnerabilities in AI LLMs

December 10, 2024 | Tom Neaves

It was a cold and wet Thursday morning, sometime in early 2006. There I was ...

CVE-2024-11477: 7-Zip Flaw Allows Remote Code Execution

November 27, 2024 | Pauline Bolaños

On November 20th, 2024, Zero Day Initiative (ZDI) researchers disclosed a ...

Rockstar 2FA Phishing-as-a-Service (PaaS): Noteworthy Email Campaigns

November 27, 2024 | Diana Solomon and John Kevin Adriano

Welcome to the second part of our investigation into the Rockstar kit, please ...

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

November 26, 2024 | Diana Solomon and John Kevin Adriano

Trustwave SpiderLabs has been actively monitoring the rise of ...

Lessons from a Honeypot with US Citizens’ Data

November 13, 2024 | Radoslaw Zdonczyk and Nikita Kazymirskyi

Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team ...

Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails

October 21, 2024 | Katrina Udquin

Introduction Previously, Trustwave SpiderLabs covered a massive fake order spam ...

How Threat Actors Conduct Election Interference Operations: An Overview

October 18, 2024 | Pauline Bolaños

The major headlines that arose from the three most recent US presidential ...

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)

October 17, 2024 | Karl Biron

Introduction In the perpetually evolving field of cybersecurity, new threats ...

Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

October 08, 2024 | Cris Tomboc and King Orande

Trustwave's Threat Intelligence team has discovered a new malware dubbed ...

What We Know So Far About Zero-Day CUPS Vulnerabilities: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177

September 30, 2024

On September 26, 2024, security researcher Simone Margaritellidisclosed the ...