Evaluating Your Security Posture: Security Assessment Basics

March 25, 2024 | David Broggy

This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Trustwave SpiderLabs: Artificial Intelligence Playing a Prime Role in BEC and Phishing Attacks

March 20, 2024

Criminals have historically been quick to embrace cutting-edge technology for ...

The Inevitable Threat: AI-Generated Email Attacks Delivered to Mailboxes

March 19, 2024 | Katrina Udquin

Generative AI exploded in popularity not too long ago but its influence on text ...

Cybersecurity Documentation Essentials

March 18, 2024 | David Broggy

This is Part 3 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Ukrainian Intelligence Claims Successful Compromise of the Russian Ministry of Defense

March 12, 2024 | Arthur Erzberger

On March 4, 2024, the Telegram channel of the Main Directorate of Intelligence ...

Cost Management Tips for Cyber Admins

March 11, 2024 | David Broggy

As anyone who has filled out an expense report can tell you, cost management is ...

Resurgence of BlackCat Ransomware

March 06, 2024 | Reegun Jayapaul

Updated March 8: Based on our experience, we believe that BlackCat's claim of ...

Cloud Architecture, Frameworks and Benchmarks

March 04, 2024 | David Broggy

At any point in your cloud security journey, you should consider practical ...

Hunting For Integer Overflows In Web Servers

March 01, 2024 | Tom Neaves

Allow me to set the scene and start proceedings off with a definition of an ...

Welcome to Adventures in Cybersecurity: The Defender Series

February 26, 2024 | David Broggy

I’m happy to say I’m done chasing Microsoft certifications (AZ104/AZ500/SC100), ...

Trustwave SpiderLabs: Insights and Solutions to Defend Educational Institutions Against Cyber Threats

February 22, 2024

Security teams responsible for defending educational institutions at higher ...

Breakdown of Tycoon Phishing-as-a-Service System

February 20, 2024 | Rodel Mendrez

Just weeks after Trustwave SpiderLabs reported on the Greatness ...

DUALITY: Advanced Red Team Persistence Through Self-Reinfecting DLL Backdoors for Unyielding Control

February 12, 2024 | Faisal Tameesh

This blog post introduces the concept of DUALITY, which is a methodology and ...

Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising

February 06, 2024

During an Advanced Continual Threat Hunt (ACTH) investigation that took place ...

Dissection Of Makop Ransomware Group

February 05, 2024 | Aishwarya Desai

This blog post outlines attack patterns identified across Makop ransomware ...

Trustwave SpiderLabs Guide: Jailbreaking Apple iOS 17 and Above

February 01, 2024 | Therese Mendoza

PLEASE NOTE: Jailbreaking any phone has the potential to permanently damage ...

Trusted Domain, Hidden Danger: Deceptive URL Redirections in Email Phishing Attacks

January 29, 2024 | Kevin Adriano

In this ever-evolving landscape of cyberthreats, email has become a prime ...

Spoofing 802.11 Wireless Beacon Management Frames with Manipulated Power Values Resulting in Denial of Service for Wireless Clients

January 26, 2024 | Tom Neaves

This is another one of those blog posts from me about how I independently ...

Trustwave SpiderLabs Detects Spike in Greatness Phishing Kit Attacks on Microsoft 365 Users

January 25, 2024 | Bernard Bautista

Trustwave SpiderLabs is tracking a spike in usage of the Greatness phishing kit ...

The dark side of 2023 Cybersecurity: Malware evolution and Cyber threats

January 25, 2024 | Fernando Martinez

In the ever-evolving cybersecurity landscape, 2023 witnessed a dramatic surge ...

Remote Desktop Event Log Analysis: Variations In Logging For Event ID 1029

January 22, 2024 | Sergey Gorbov

This blog covers Stroz Friedberg’s novel research and analysis of Remote ...

Apache ActiveMQ Vulnerability Leads to Stealthy Godzilla Webshell

January 18, 2024 | Rodel Mendrez

Trustwave has observed a surge in attacks exploiting vulnerabilities in Apache ...

Beyond the Facade: Unraveling URL Redirection in Google Services

January 17, 2024 | Mike Casayuran

In the murky waters of cyber threats, one tactic has steadily gained wide ...

Types of Social Engineering Attacks used to Gain Internal Network Access

January 16, 2024 | Zak Willsallen

Social engineering is a technique commonly used by adversaries to manipulate ...

(Response) Splitting Up Reverse Proxies To Reach Internal Only Paths

January 11, 2024 | Tom Neaves

When I’m carrying out security research into a thing, I generally don’t like to ...

Trustwave Transfers ModSecurity Custodianship to the Open Worldwide Application Security Project (OWASP)

January 09, 2024

After serving as its steward for over a decade, Trustwave has agreed to ...

CVE-2023-50916: Authentication Coercion Vulnerability in Kyocera Device Manager

January 08, 2024 | Jordan Hedges

Overview of Authentication Coercion Vulnerability

AsyncRAT loader: Obfuscation, DGAs, decoys and Govno

January 05, 2024 | Fernando Martinez

Executive summary LevlBlue Labs has identified a campaign to deliver AsyncRAT ...