SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp

November 19, 2025 | Nathaniel Morales, John Basmayor, and Nikita Kazymirskyi

Hunter

Microsoft Issues Emergency Patch for Windows Server Update Services RCE Vulnerability CVE-2025-59287

November 14, 2025 | Fernando Martinez

LevelBlue Labs is tracking a severe vulnerability in Windows Server Update ...

The Cat's Out of the Bag: A 'Meow Attack' Data Corruption Campaign Simulation via MAD-CAT

November 07, 2025 | Karl Biron

In 2024, I published Feline Hackers Among Us? (A Deep Dive and Simulation of ...

The F5 BIG-IP Source Code Breach

October 17, 2025 | Karl Sigler

On August 9, F5 discovered that multiple systems were compromised by what it is ...

US Secret Service Blocks Massive Telecom Attack in New York

September 24, 2025 | Karl Sigler

The Secret Service’s takedown in New York shines a light on a type of threat ...

Salesloft Drift Supply Chain Attack Affects Hundreds of Businesses

September 09, 2025 | Karl Sigler

Trustwave's Security & Compliance Team is aware of the Salesloft ...

Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files

September 05, 2025 | Tom Neaves

AI agents (utilizing LLMs and RAG) are being used within SOCs and SIEMS to both ...

How Researchers Collect Indicators of Compromise

August 14, 2025 | Messiah Dela Cruz

As security researchers, we actively monitor the latest CVEs and their publicly ...

When Hackers Call: Social Engineering, Abusing Brave Support, and EncryptHub’s Expanding Arsenal

August 13, 2025 | Nathaniel Morales and Nikita Kazymirskyi

Trustwave SpiderLabs researchers have recently identified an EncryptHub ...

Echoes in the Shell: Legacy Tooling Behind Ongoing SharePoint ‘ToolShell’ Exploitation

August 08, 2025 | Serhii Melnyk, Cris Tomboc and King Orande

The Trustwave SpiderLabs CTI team began correlating telemetry from multiple ...

Using SQLmap to Dig for Sensitive Data in SQL Databases

July 22, 2025 | Karl Biron

In our latest report Data Pirates' Toolkit (Leveraging SQLmap for Unearthing ...

No Tell Motel: Trustwave Exposes the Secrets of Dark Web Travel Agencies

July 21, 2025 | Nikita Kazymirskyi

Dark web travel agencies remain a persistent niche in the cybercrime ecosystem. ...

Unmasking Malicious APKs: Android Malware Blending Click Fraud and Credential Theft

July 18, 2025 | Serhii Melnyk

Malicious APKs (Android Package Kit files) continue to serve as one of the most ...

KAWA4096’s Ransomware Tide: Rising Threat With Borrowed Styles

July 16, 2025 | Nathaniel Morales and John Basmayor

KAWA4096, a ransomware whose name includes "Kawa", the Japanese word for ...

The Digital Front Line: Israel and Iran Turn the Internet into a Covert Combat Zone

June 18, 2025 | Arthur Erzberger

The Israel-Iran conflict is barely a week old, but the security repercussions ...

PhaaS the Secrets: The Hidden Ties Between Tycoon2FA and Dadsec's Operations

May 28, 2025 | Cris Tomboc and King Orande

Phishing-as-a-Service (PhaaS) platforms have significantly reshaped the ...

The Blind Spots of Multi-Agent Systems: Why AI Collaboration Needs Caution

May 23, 2025 | Muhammad Ahmad

Multi-agent systems (MAS) are reshaping industries from IT services to ...

Yet Another NodeJS Backdoor (YaNB): A Modern Challenge

April 29, 2025 | Reegun Jayapaul

During an Advanced Continual Threat Hunt (ACTH) investigation conducted in ...

Proton66 Part 2: Compromised WordPress Pages and Malware Campaigns

April 17, 2025 | Pawel Knapczyk, Dawid Nesterowicz

Earlier this year SpiderLabs observed an increase in mass scanning, credential ...

Proton66 Part 1: Mass Scanning and Exploit Campaigns

April 14, 2025 | Pawel Knapczyk, Dawid Nesterowicz

Trustwave SpiderLabs continuously tracks a range of malicious activities ...

Tycoon2FA New Evasion Technique for 2025

April 10, 2025 | Rodel Mendrez

The Tycoon 2FA phishing kit has adopted several new evasion techniques aimed at ...

Babuk2 Bjorka: The Evolution of Ransomware for ‘Data Commoditization’

April 01, 2025 | John Basmayor

An investigation that started with a tip from one of our threat intel sources ...

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1

March 19, 2025 | Karl Biron

Picture this: an always-awake, never-tired, high-speed librarian that instantly ...

A Deep Dive into Strela Stealer and how it Targets European Countries

March 06, 2025 | Dawid Nesterowicz

Infostealers have dominated the malware landscape due to the ease of threat ...

The Rise of Email Marketing Platforms for Business Email Compromise Attacks

February 18, 2025 | Maria Katrina Udquin

In a statistical report published in September 2024 by the Federal Bureau of ...

Beyond the Chatbot: Meta Phishing with Fake Live Support

February 04, 2025 | Mike Casayuran and John Kevin Adriano

In a previous Trustwave SpiderLabs’ blog, we explored how cybercriminals ...

Trustwave SpiderLabs 2025 Trustwave Risk Radar Report: Energy and Utilities Sector

January 22, 2025 | Admin

The energy sector plays a crucial role in national security by ensuring the ...

The New Face of Ransomware: Key Players and Emerging Tactics of 2024

January 21, 2025 | Serhii Melnyk

As we step into 2025, the high-impact, financially motivated ransomware ...