Evaluating Your Security Posture: Security Assessment Basics
March 25, 2024 | David Broggy
This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Trustwave SpiderLabs: Artificial Intelligence Playing a Prime Role in BEC and Phishing Attacks
March 20, 2024
Criminals have historically been quick to embrace cutting-edge technology for ...
The Inevitable Threat: AI-Generated Email Attacks Delivered to Mailboxes
March 19, 2024 | Katrina Udquin
Generative AI exploded in popularity not too long ago but its influence on text ...
Cybersecurity Documentation Essentials
March 18, 2024 | David Broggy
This is Part 3 in my ongoing project to cover 30 cybersecurity topics in 30 ...
Ukrainian Intelligence Claims Successful Compromise of the Russian Ministry of Defense
March 12, 2024 | Arthur Erzberger
On March 4, 2024, the Telegram channel of the Main Directorate of Intelligence ...
Cost Management Tips for Cyber Admins
March 11, 2024 | David Broggy
As anyone who has filled out an expense report can tell you, cost management is ...
Resurgence of BlackCat Ransomware
March 06, 2024 | Reegun Jayapaul
Updated March 8: Based on our experience, we believe that BlackCat's claim of ...
Cloud Architecture, Frameworks and Benchmarks
March 04, 2024 | David Broggy
At any point in your cloud security journey, you should consider practical ...
Hunting For Integer Overflows In Web Servers
March 01, 2024 | Tom Neaves
Allow me to set the scene and start proceedings off with a definition of an ...
Welcome to Adventures in Cybersecurity: The Defender Series
February 26, 2024 | David Broggy
I’m happy to say I’m done chasing Microsoft certifications (AZ104/AZ500/SC100), ...
Trustwave SpiderLabs: Insights and Solutions to Defend Educational Institutions Against Cyber Threats
February 22, 2024
Security teams responsible for defending educational institutions at higher ...
Breakdown of Tycoon Phishing-as-a-Service System
February 20, 2024 | Rodel Mendrez
Just weeks after Trustwave SpiderLabs reported on the Greatness ...
DUALITY: Advanced Red Team Persistence Through Self-Reinfecting DLL Backdoors for Unyielding Control
February 12, 2024 | Faisal Tameesh
This blog post introduces the concept of DUALITY, which is a methodology and ...
Trustwave SpiderLabs Uncovers Ov3r_Stealer Malware Spread via Phishing and Facebook Advertising
February 06, 2024
During an Advanced Continual Threat Hunt (ACTH) investigation that took place ...
Dissection Of Makop Ransomware Group
February 05, 2024 | Aishwarya Desai
This blog post outlines attack patterns identified across Makop ransomware ...
Trustwave SpiderLabs Guide: Jailbreaking Apple iOS 17 and Above
February 01, 2024 | Therese Mendoza
PLEASE NOTE: Jailbreaking any phone has the potential to permanently damage ...
Trusted Domain, Hidden Danger: Deceptive URL Redirections in Email Phishing Attacks
January 29, 2024 | Kevin Adriano
In this ever-evolving landscape of cyberthreats, email has become a prime ...
Spoofing 802.11 Wireless Beacon Management Frames with Manipulated Power Values Resulting in Denial of Service for Wireless Clients
January 26, 2024 | Tom Neaves
This is another one of those blog posts from me about how I independently ...
Trustwave SpiderLabs Detects Spike in Greatness Phishing Kit Attacks on Microsoft 365 Users
January 25, 2024 | Bernard Bautista
Trustwave SpiderLabs is tracking a spike in usage of the Greatness phishing kit ...
The dark side of 2023 Cybersecurity: Malware evolution and Cyber threats
January 25, 2024 | Fernando Martinez
In the ever-evolving cybersecurity landscape, 2023 witnessed a dramatic surge ...
Remote Desktop Event Log Analysis: Variations In Logging For Event ID 1029
January 22, 2024 | Sergey Gorbov
This blog covers Stroz Friedberg’s novel research and analysis of Remote ...
Apache ActiveMQ Vulnerability Leads to Stealthy Godzilla Webshell
January 18, 2024 | Rodel Mendrez
Trustwave has observed a surge in attacks exploiting vulnerabilities in Apache ...
Beyond the Facade: Unraveling URL Redirection in Google Services
January 17, 2024 | Mike Casayuran
In the murky waters of cyber threats, one tactic has steadily gained wide ...
Types of Social Engineering Attacks used to Gain Internal Network Access
January 16, 2024 | Zak Willsallen
Social engineering is a technique commonly used by adversaries to manipulate ...
(Response) Splitting Up Reverse Proxies To Reach Internal Only Paths
January 11, 2024 | Tom Neaves
When I’m carrying out security research into a thing, I generally don’t like to ...
Trustwave Transfers ModSecurity Custodianship to the Open Worldwide Application Security Project (OWASP)
January 09, 2024
After serving as its steward for over a decade, Trustwave has agreed to ...
CVE-2023-50916: Authentication Coercion Vulnerability in Kyocera Device Manager
January 08, 2024 | Jordan Hedges
Overview of Authentication Coercion Vulnerability
AsyncRAT loader: Obfuscation, DGAs, decoys and Govno
January 05, 2024 | Fernando Martinez
Executive summary LevlBlue Labs has identified a campaign to deliver AsyncRAT ...