Secure Access Service Edge: Another Multi-Tool for the SOC
June 17, 2024 | David Broggy
Over the years, several security defense architectures have merged into a ...
DUALITY Part II - Initial Access and Tradecraft Improvements
June 14, 2024 | Faisal Tameesh
This blog post discusses tradecraft improvements and how the same pipeline can ...
The Sentinel’s Watch: Building a Security Reporting Framework
June 10, 2024 | David Broggy
Imagine being on shift as the guard of a fortress. Your job is to identify ...
Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor
June 05, 2024 | Rodel Mendrez
During a recent client investigation, Trustwave SpiderLabs found a malicious ...
Threat Advisory: Snowflake Data Breach Impacts Its Clients
June 04, 2024 | Admin
Executive Summary On May 20, 2024, Live Nation discovered and disclosed an ...
Cyber Exterminators: Monitoring the Shop Floor with OT Security
June 03, 2024 | David Broggy
Pressure is increasing on manufacturers to monitor their shop floors for ...
2024 Public Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies
May 14, 2024 | Admin
Trustwave SpiderLabs’ 2024 Public Sector Threat Landscape: Trustwave Threat ...
How to Create the Asset Inventory You Probably Don't Have
May 13, 2024 | David Broggy
This is Part 12 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Guardians of the Gateway: Identity and Access Management Best Practices
May 06, 2024 | David Broggy
This is Part 10 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Protecting Zion: InfoSec Encryption Concepts and Tips
April 29, 2024 | David Broggy
This is Part 9 in my ongoing project to cover 30 cybersecurity topics in 30 ...
The Invisible Battleground: Essentials of EASM
April 22, 2024 | David Broggy
Know your enemy – inside and out. External Attack Surface Management tools are ...
EDR – The Multi-Tool of Security Defenses
April 22, 2024 | David Broggy
This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Fake Dialog Boxes to Make Malware More Convincing
April 17, 2024 | Ram Prakash
Let’s explore how SpiderLabs created and incorporated user prompts, ...
The Secret Cipher: Modern Data Loss Prevention Solutions
April 15, 2024 | David Broggy
This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 ...
CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway
April 12, 2024 | Admin
UPDATE: Palo Alto Networks confirmed on Tuesday (4/16) that disabling device ...
CNAPP, CSPM, CIEM, CWPP – Oh My!
April 08, 2024 | David Broggy
We all know the cybersecurity industry loves its acronyms, but just because ...
Phishing Deception - Suspended Domains Reveal Malicious Payload for Latin American Region
April 05, 2024 | Karla Agregado
Recently, we observed a phishing campaign targeting the Latin American region. ...
Zero Trust Essentials
April 01, 2024 | David Broggy
This is Part 5 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Why We Should Probably Stop Visually Verifying Checksums
March 27, 2024 | Tom Neaves
Hello there! Thanks for stopping by. Let me get straight into it and start ...
Evaluating Your Security Posture: Security Assessment Basics
March 25, 2024 | David Broggy
This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Trustwave SpiderLabs: Artificial Intelligence Playing a Prime Role in BEC and Phishing Attacks
March 20, 2024 | Admin
Criminals have historically been quick to embrace cutting-edge technology for ...
The Inevitable Threat: AI-Generated Email Attacks Delivered to Mailboxes
March 19, 2024 | Katrina Udquin
Generative AI exploded in popularity not too long ago but its influence on text ...
Cybersecurity Documentation Essentials
March 18, 2024 | David Broggy
This is Part 3 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Ukrainian Intelligence Claims Successful Compromise of the Russian Ministry of Defense
March 12, 2024 | Arthur Erzberger
On March 4, 2024, the Telegram channel of the Main Directorate of Intelligence ...
Cost Management Tips for Cyber Admins
March 11, 2024 | David Broggy
As anyone who has filled out an expense report can tell you, cost management is ...
Resurgence of BlackCat Ransomware
March 06, 2024 | Reegun Jayapaul
Updated March 8: Based on our experience, we believe that BlackCat's claim of ...
Hunting For Integer Overflows In Web Servers
March 01, 2024 | Tom Neaves
Allow me to set the scene and start proceedings off with a definition of an ...
Welcome to Adventures in Cybersecurity: The Defender Series
February 26, 2024 | David Broggy
I’m happy to say I’m done chasing Microsoft certifications (AZ104/AZ500/SC100), ...