What Attackers Aim to Compromise in Cloud Environments

November 21, 2019 | Marcos Colón

The business world is rapidly changing and the evolution of handheld technology ...

Experts Q&A: Revisiting 2019 Cybersecurity Predictions

August 06, 2019 | Marcos Colón

Time flies, especially in the world of cybersecurity. We’re already mid-way ...

3 Intriguing Observations of Cybercriminals on the Dark Web

March 29, 2019 | Dan Kaplan

Not long ago, researchers from the Trustwave SpiderLabs team documented several ...

6 Spam, Phishing and Malicious Email Trends to Watch For

March 07, 2019 | Dan Kaplan

Cybercriminals aren’t going to exert more effort than they have to. For all the ...

Notes from the Underground: A Multi-Part Investigation into the Cybercriminal Dark Web

September 19, 2018 | Dan Kaplan

The other day, I heard a staggering fact: At any given time, there are upward ...

The Good (But Mostly Still Bad) News About Spam and Phishing

May 31, 2018 | Dan Kaplan

Bill Gates' bold prediction that spam would be a "thing of the past" is inching ...

How a Ransomware Incident Response Case Fascinated Our Investigators

April 26, 2018 | Dan Kaplan

Roughly one year removed from the prolific and potent WannaCry and NotPetya ...

Here is an Email Thread of an Actual CEO Fraud Attack

April 17, 2018 | Dan Kaplan

For as much as we're drowning in emails - to the point where it has become ...

Two if by Sea: How Trustwave and Inmarsat Are Helping to Secure Vessels

January 31, 2018 | Dan Kaplan

When the average person thinks of the dangers faced by the maritime industry, ...

Dry Those Tears: A Primer on Preventing, Detecting and Responding to Ransomware Like WannaCry

May 16, 2017 | Dan Kaplan

Given the vigorous growth of ransomware in 2016, it was just a matter of time ...

The State of Cybercrime and Current Threats to Avoid

March 28, 2017 | Dan Kaplan

The dark web is a mysterious place for most internet users, but for ethical ...

Why Are ATM Attacks Getting Worse?

August 02, 2016 | Dan Kaplan

Six years removed from the famed late researcher Barnaby Jack's legendary Black ...

How an Upgraded Version of the RIG Exploit Kit is Infecting 27k Computers Per Day

August 03, 2015 | Dan Kaplan

(UPDATED BELOW)

Q&A: Can VENOM Take a Bite Out of Your Data Center?

May 13, 2015 | Dan Kaplan

Security researchers have uncovered a potentially major vulnerability, which ...

Q&A: A New Point-of-Sale Malware Family Named Punkey

April 15, 2015 | Dan Kaplan

In conjunction with a U.S. Secret Service investigation, Trustwave SpiderLabs ...

Bark and Bite? The Essential Facts on the POODLE Vulnerability

October 16, 2014 | Dan Kaplan

Another high-profile vulnerability has been unearthed. Following the unwelcome ...

Behind the Scenes of Backoff: A Q&A on the Latest Malware Danger

August 21, 2014 | Abby Ross

In light of a recent string of breaches involving a new point-of-sale malware ...

FAQs: The Heartbleed Bug

April 10, 2014 | John Miller

We have a big one on our hands. Potentially affecting hundreds of thousands of ...