SpiderLabs Ransomware Tracker Update November 2025: Qlin, Cl0p, and Akira Vie for Top Attacker

December 03, 2025

Defining and Defending Against a Zero Day Attack

December 02, 2025

Unexpected attacks are the hardest to fend off.

Black Friday 2025: Aligning Cyber Resilience and Business Goals to Protect Your Retail Business

November 25, 2025

Black Friday Cyber Threats: As retail sales peak, cybercriminals ramp up ...

Art and Science: Cyber and Physical Security Convergence Deficiencies in the Louvre Heist

November 14, 2025 | William Evers and Anthony Abell

Cyber meets physical security: Weak passwords and outdated systems may have ...

SpiderLabs Ransomware Tracker Update October 2025: Qlin Doubles Down on Attacks

November 04, 2025

The worldwide ransomware landscape saw a dramatic shift in attacks in October ...

Protecting the Systems that Sustain Us: Securing Critical Infrastructure During Cybersecurity Awareness Month

October 30, 2025

To close out Trustwave’s, A LevelBlue Company, Cybersecurity Awareness Month ...

API Security: Challenges for a Secure Digital Frontier

October 21, 2025 | Dora Miranda

Organizations continue their digital transformation, with APIs now serving as ...

SocGholish: Turning Application Updates into Vexing Infections

October 16, 2025 | Cris Tomboc

This blog is the latest in a series that delves into the deep research ...

Facing the Storm: Navigating the Complex Challenges of Bot Threats in Web Application and API Security

October 14, 2025 | Dora Miranda

Bots and Web Application Security: Confront advanced bots that mimic humans, ...

Tackling the Modern WAF Challenge: Why Managed WAAP Is the Key to Effective Application Security

October 09, 2025

Organizations today face a continuous struggle to secure their web applications ...

Manufacturing: Executives Voice Cyberattack Readiness Concerns

October 06, 2025

Manufacturing executives recently surveyed by LevelBlue expressed a deep ...

LevelBlue Managed WAAP Enables Organizations to Solve Day 1 WAAP Implementation Challenges

October 02, 2025

Deploying Web Application and API Protection (WAAP) systems is crucial for ...

SpiderLabs Ransomware Tracker Update September 2025: Qilin, Akira Top Ransomware Attackers

September 30, 2025

The threat groups Qilin and Akira together conducted about one-quarter of the ...

Shades of Red: Redefining the Use of Red Flags in Cybersecurity and Insurance

September 29, 2025 | William Evers, Mudit Singhania, Scott Swanson

In cybersecurity, several related but divergent meanings have been ascribed to ...

LevelBlue Spotlight Report Finds Manufacturers Struggling with the Impact of AI and Supply Chain Risk

September 24, 2025

LevelBlue’s newly released 2025 Spotlight Report: Cyber Resilience and Business ...

6 Steps to Counter Fourth-Party Supply Chain Vendor Attacks

September 23, 2025 | Kory Daniels

Managing a cybersecurity program is hard, but also very meaningful, work.

Regulatory Gaps and Legacy Systems Are Aiding AI-Powered Cyberattacks on Governments

September 22, 2025 | Craig Searle

Storm-2603: Targeting SharePoint Vulnerabilities and Critical Infrastructure Worldwide

September 17, 2025 | Cris Tomboc

The threat group Storm-2603 is actively exploiting Microsoft SharePoint ...

From Shadow IT to Shadow AI: The Evolution of Unseen Risk

September 16, 2025 | Jon Spokes

Security leaders are well acquainted with Shadow IT; the unsanctioned apps, ...

Not All Cyberattacks Begin with a Phishing Attack, Hack or Exploited Vulnerability

September 10, 2025

The strongest cybersecurity strategy includes robust physical security, since ...

The Cost of Inaction: Securing the Energy Grid Before It's Too Late

September 09, 2025 | Kory Daniels

Critical infrastructure is under attack. Cyber threats to the energy sector ...

Securing Healthcare’s Vulnerable Supply Chain

September 02, 2025

Healthcare supply chains are increasingly vulnerable to cyber threats through ...

The Next Level of Managed Vulnerability Scanning: Authenticated and Unauthenticated Scans

August 25, 2025 | Mary Eduel Neyra

Trustwave, A LevelBlue Company, is a huge proponent of employing offensive ...

The Continuing Threat of Cyberattacks on Healthcare

August 13, 2025 | Kory Daniels

The current trends in healthcare technology adoption present an interesting ...

How Legacy Manufacturing Systems Make a Hacker’s Job Easy

August 07, 2025 | Karl Sigler

Outdated manufacturing systems are an easy target for ransomware, crippling ...

Inside Silver Fox’s Den: Trustwave SpiderLabs Unmasks a Global Threat Actor

August 05, 2025

Trustwave SpiderLabs Threat Operations' latest research details the advanced ...

Boosting Your Microsoft Email Security with Trustwave's Managed Phishing Service

July 30, 2025

It seems everyone loves phishing attacks.

The Danger of Weak Passwords: UK Trucking Firm Attacked and Permanently Shut Down

July 25, 2025

Discover how a single weak password led to a UK trucking firm's permanent ...