Windows Search Index: The Forensic Artifact You’ve Been Searching For
April 26, 2025 | Phalgun Kulkarni and Julia Paluch
The Windows Search index is a useful artifact for Incident Response ...
Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks
April 21, 2025 | Tom Neaves
I think you’ll agree with me that growth in the AI landscape is pretty full-on ...
Proton66 Part 2: Compromised WordPress Pages and Malware Campaigns
April 17, 2025 | Pawel Knapczyk, Dawid Nesterowicz
Earlier this year SpiderLabs observed an increase in mass scanning, credential ...
Maximizing Value: How Companies and Pentesters Can Achieve More Together
April 15, 2025 | Elijah Seymour, Rohit Kapur, Stephen Komal, Mark Stanislav (Fullstory)
A closer look at the collaborative efforts between Stroz Friedberg and ...
Proton66 Part 1: Mass Scanning and Exploit Campaigns
April 14, 2025 | Pawel Knapczyk, Dawid Nesterowicz
Trustwave SpiderLabs continuously tracks a range of malicious activities ...
Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks
April 10, 2025 | Bernard Bautista and Kevin Adriano
Ever thought an image file could be part of a cyber threat? The Trustwave ...
Tycoon2FA New Evasion Technique for 2025
April 10, 2025 | Rodel Mendrez
The Tycoon 2FA phishing kit has adopted several new evasion techniques aimed at ...
Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse
April 08, 2025 | Serhii Melnyk and Nikita Kazymirskyi
In February 2025, the cybersecurity community witnessed an unprecedented leak ...
Babuk2 Bjorka: The Evolution of Ransomware for ‘Data Commoditization’
April 01, 2025 | John Basmayor
An investigation that started with a tip from one of our threat intel sources ...
2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures
March 26, 2025
Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks ...
Trustwave SpiderLabs Threat Review: Alleged Oracle Compromise
March 25, 2025 | Nikita Kazymirskyi and Karl Sigler
On March 20, a relatively unknown user on Breach Forums posted the allegation ...
Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)
March 24, 2025 | Tom Neaves
The concept of “principle of least privilege” has been around for a long time. ...
Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2
March 20, 2025 | Karl Biron
In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your ...
Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1
March 19, 2025 | Karl Biron
Picture this: an always-awake, never-tired, high-speed librarian that instantly ...
DNSForge – Relaying with Force
March 12, 2025 | Apurva Goenka
Introducing a new attack mode for greater flexibility and customization.
Resurgence of a Fake Captcha Malware Campaign
March 12, 2025 | Reegun Jayapaul
During an Advanced Continual Threat Hunt (ACTH) investigation in early February ...
The Russia-Ukraine Cyber War Part 4: Development in Group Attributions for Russian State Actors
March 07, 2025 | Pawel Knapczyk and Nikita Kazymirskyi
This is the final installment of Trustwave SpiderLabs Russia-Ukraine digital ...
A Deep Dive into Strela Stealer and how it Targets European Countries
March 06, 2025 | Dawid Nesterowicz
Infostealers have dominated the malware landscape due to the ease of threat ...
The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure
March 05, 2025 | Pawel Knapczyk and Nikita Kazymirskyi
This post is the third part of our blog series that tackles the Russia-Ukraine ...
2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector
February 26, 2025
2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: ...
The Russia-Ukraine Cyber War Part 2: Attacks Against Government Entities, Defense Sector, and Human Targets
February 25, 2025 | Pawel Knapczyk and Nikita Kazymirskyi
In the first part of Trustwave SpiderLabs’ Russia-Ukraine war blog series, we ...
We’re All in This Together: The Case for Purple Teaming
February 21, 2025 | Aidan Barrington
Why should you consider a purple team? What can you gain from it, and how do ...
The Russia-Ukraine Cyber War Part 1: Three Years of Cyber Warfare
February 20, 2025 | Pawel Knapczyk and Nikita Kazymirskyi
As the third anniversary of the start of the Russia-Ukraine war approaches, ...
The Rise of Email Marketing Platforms for Business Email Compromise Attacks
February 18, 2025 | Maria Katrina Udquin
In a statistical report published in September 2024 by the Federal Bureau of ...
Parsing ESXi Logs for Incident Response with QELP
February 10, 2025 | Phalgun Kulkarni
Threat actors frequently target ESXi servers to disrupt business environments ...
Beyond the Chatbot: Meta Phishing with Fake Live Support
February 04, 2025 | Mike Casayuran and John Kevin Adriano
In a previous Trustwave SpiderLabs’ blog, we explored how cybercriminals ...
Cracking the Giant: How ODAT Challenges Oracle, the King of Databases
January 27, 2025 | Karl Biron
In the past decade, Oracle Database (Oracle DB) has reigned supreme in the ...
Trustwave SpiderLabs 2025 Trustwave Risk Radar Report: Energy and Utilities Sector
January 22, 2025
The energy sector plays a crucial role in national security by ensuring the ...