Database Protection

The Danger of Weak Passwords: UK Trucking Firm Attacked and Permanently Shut Down

The Danger of Weak Passwords: UK Trucking Firm Attacked and Permanently Shut Down 2025-07-25 at 20:18 By Discover how a single weak password led to a UK trucking firm’s permanent shutdown by a ransomware attack, highlighting the critical link between passwords and enterprise cybersecurity. Learn actionable strategies for creating strong passwords and implementing broader cybersecurity […]

React to this headline:

Loading spinner

The Danger of Weak Passwords: UK Trucking Firm Attacked and Permanently Shut Down Read More »

Using SQLmap to Dig for Sensitive Data in SQL Databases

Using SQLmap to Dig for Sensitive Data in SQL Databases 2025-07-22 at 16:41 By Karl Biron In our latest report Data Pirates’ Toolkit (Leveraging SQLmap for Unearthing Digital Gold), we take a comprehensive look at a tried-and-tested cyberattack methodology that threat actors can use to unlock sensitive and critical data from unsecured databases: SQL injection (SQLi)

React to this headline:

Loading spinner

Using SQLmap to Dig for Sensitive Data in SQL Databases Read More »

Ensuring Compliance with DORA: How Trustwave Secures Your Databases and Meets Regulatory Standards

Ensuring Compliance with DORA: How Trustwave Secures Your Databases and Meets Regulatory Standards 2025-07-17 at 16:20 By Montserrat Bonilla Achieve DORA Compliance with automated database security controls, audit-ready reports, and continuous compliance monitoring. Streamline Vulnerability Management by identifying, prioritizing, and remediating database risks across hybrid environments. Enhance Database Security with Trustwave’s enterprise-grade solutions, built to

React to this headline:

Loading spinner

Ensuring Compliance with DORA: How Trustwave Secures Your Databases and Meets Regulatory Standards Read More »

Trustwave Executive Business Reviews Turn Security Updates into Board Level Conversations

Trustwave Executive Business Reviews Turn Security Updates into Board Level Conversations 2025-07-16 at 16:03 By Discover how Trustwave’s new Executive Business Reviews (EBRs) transform routine updates into powerful, strategic discussions. Learn how EBRs shift the focus from raw data to real-world risk reduction, operational resilience, and cost efficiency for your organization. See how these quarterly

React to this headline:

Loading spinner

Trustwave Executive Business Reviews Turn Security Updates into Board Level Conversations Read More »

The Breach Beyond the Runway: Cybercriminals Targeted Qantas Through a Trusted Partner

The Breach Beyond the Runway: Cybercriminals Targeted Qantas Through a Trusted Partner 2025-07-04 at 15:34 By Nikita Kazymirskyi On July 3, 2025, Qantas confirmed in an update statement that a cyber incident had compromised data from one of its contact centers, following the detection of suspicious activity on June 30. The breach didn’t strike at the heart

React to this headline:

Loading spinner

The Breach Beyond the Runway: Cybercriminals Targeted Qantas Through a Trusted Partner Read More »

Ransomware Threat Still Rising: Key Trends in the Technology Sector in 2025

Ransomware Threat Still Rising: Key Trends in the Technology Sector in 2025 2025-07-02 at 16:01 By The 2025 Trustwave Technology Risk Radar Report highlights ransomware as a major and persistent threat within the technology sector that shows no signs of abating as new ransomware-focused threat groups are constantly appearing. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Ransomware Threat Still Rising: Key Trends in the Technology Sector in 2025 Read More »

Trustwave DbProtect Expands to Secure Snowflake: Strengthening AI Repository Protection

Trustwave DbProtect Expands to Secure Snowflake: Strengthening AI Repository Protection 2025-06-30 at 16:03 By Discover how Trustwave DbProtect enhances database security for cloud-based platforms like Snowflake, ensuring your AI repositories remain safe from potential threats. Learn how Trustwave’s database activity monitoring and threat detection capabilities provide real-time insights into database activities and potential vulnerabilities. Understand the importance

React to this headline:

Loading spinner

Trustwave DbProtect Expands to Secure Snowflake: Strengthening AI Repository Protection Read More »

The Attack Vector: Database Triggers as Persistence Mechanisms

The Attack Vector: Database Triggers as Persistence Mechanisms 2025-06-24 at 16:15 By Organizations often assume that restoring a backup to a patched environment eliminates threats. However, backups encapsulate both data and schema objects, including triggers. A compromised backup, often taken after an initial breach, may contain hidden triggers that reactivate the attacker’s access upon restore.

React to this headline:

Loading spinner

The Attack Vector: Database Triggers as Persistence Mechanisms Read More »

Answering 7 Questions About Trustwave Managed Vulnerability Scanning (MVS)

Answering 7 Questions About Trustwave Managed Vulnerability Scanning (MVS) 2025-06-13 at 00:33 By Understanding and mitigating vulnerabilities is paramount for any organization. Trustwave’s Managed Vulnerability Scanning (MVS) offers a comprehensive solution to help businesses stay ahead of potential risks and ensure proper database protection. But what exactly is MVS, and how can it benefit your organization? This article

React to this headline:

Loading spinner

Answering 7 Questions About Trustwave Managed Vulnerability Scanning (MVS) Read More »

Using Password 123456 is Bad, but No Password is Worse

Using Password 123456 is Bad, but No Password is Worse 2025-06-05 at 19:48 By An independent cybersecurity researcher claims to have uncovered a breach of an unnamed database containing 184 million records, with exposed information including emails, passwords, and login links. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Using Password 123456 is Bad, but No Password is Worse Read More »

Why Offensive Security Is Crucial for Retail Resilience

Why Offensive Security Is Crucial for Retail Resilience 2025-05-09 at 16:12 By Retail Cyberattacks: How recent incidents highlight the need for proactive security. Offensive Security Tactics: Key strategies to identify and mitigate retail vulnerabilities. DFIR Best Practices: Responding to cyber incidents with speed and precision. The three high-profile UK retailers struck with cyberattacks in the last few weeks

React to this headline:

Loading spinner

Why Offensive Security Is Crucial for Retail Resilience Read More »

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider 2025-05-02 at 19:32 By The UK retail market has been thrown into turmoil in recent weeks, with three of that nation’s highest-profile retailers being targeted allegedly by the well-known threat group Scattered Spider in at least one of the most disruptive incidents. This article is an

React to this headline:

Loading spinner

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider Read More »

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs 2025-04-30 at 16:03 By As detailed in the 2025 Trustwave Risk Radar Report, cybercriminals are increasingly targeting the manufacturing sector with sophisticated phishing tactics, exploiting both human behavior and trusted platforms. Trustwave SpiderLabs researchers uncover the most prevalent phishing lures—file-sharing notifications, HR documents, fake payment

React to this headline:

Loading spinner

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs Read More »

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions 2025-04-11 at 16:08 By Ed Williams AI and Energy Security: The UK’s Crucial Cybersecurity Challenge – Learn why safeguarding the energy sector is critical for the UK’s AI ambitions and technological leadership. Rising Cyber Threats: Ransomware and Legacy Systems in the Energy Sector –

React to this headline:

Loading spinner

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions Read More »

Why Strong Passwords are Still the Best Defence Against Cyber Threats

Why Strong Passwords are Still the Best Defence Against Cyber Threats 2025-04-08 at 16:29 By Jason Whyte Weak passwords are a leading cause of cyber breaches, contributing to 86% of incidents. Strong password policies and practices significantly reduce the risk of attacks. Implementing additional measures like multifactor authentication (MFA) and password managers enhances security. After

React to this headline:

Loading spinner

Why Strong Passwords are Still the Best Defence Against Cyber Threats Read More »

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks 2025-04-01 at 16:04 By Barry O’Connell Insider threats are on the rise—understand how both intentional and unintentional risks impact your cybersecurity strategy. 40% of companies reported more insider-related incidents —learn how to detect and prevent insider threats before they cause damage. Strengthen your insider threat defense with a

React to this headline:

Loading spinner

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks Read More »

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity 2025-03-28 at 15:09 By Uncover Critical Cybersecurity Gaps: Learn how Trustwave SpiderLabs’ Red Team identified vulnerabilities in a US-based healthcare system. Real-World Red Team Insights: Explore key findings from simulated attacks that reveal how adversaries could compromise sensitive data. Healthcare Cybersecurity Trends: Access exclusive

React to this headline:

Loading spinner

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity Read More »

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups 2025-03-27 at 15:08 By Top Targets: Discover which healthcare segments ransomware attackers target the most. Threat Actors Exposed: Learn about the cybercriminal groups behind the biggest healthcare attacks. Real-World Impact: See how ransomware disrupts patient care, emergency services, and medical research. Ransomware remains the primary threat the

React to this headline:

Loading spinner

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups Read More »

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need for

React to this headline:

Loading spinner

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report Read More »

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need

React to this headline:

Loading spinner

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures Read More »

Scroll to Top