Database Protection

Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War

Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War 2025-02-21 at 00:01 By As the third anniversary of the start of the Russia-Ukraine war approaches, Trustwave SpiderLabs created a series of blog posts to look back, reflect upon, and explain how this 21st Century war is being fought not just on […]

React to this headline:

Loading spinner

Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War Read More »

Cyber and Physical Security Considerations for Returning to the Office

Cyber and Physical Security Considerations for Returning to the Office 2025-02-11 at 16:01 By Kory Daniels When remote work became mandatory in the wake of the 2020 COVID pandemic, organizations had to quickly dispatch staffers to their homes with all the equipment, and services, they would need to do their jobs. This article is an

React to this headline:

Loading spinner

Cyber and Physical Security Considerations for Returning to the Office Read More »

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge 2025-02-04 at 22:48 By Two newcomers have made their way onto the ransomware threat group stage, becoming the biggest threat to the energy and utilities sector in 2025. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge Read More »

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats 2025-01-29 at 20:49 By This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. This article is an excerpt from Trustwave Blog View Original Source React to

React to this headline:

Loading spinner

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats Read More »

Cracking the Giant: How ODAT Challenges Oracle, the King of Databases

Cracking the Giant: How ODAT Challenges Oracle, the King of Databases 2025-01-27 at 16:04 By Karl Biron In the past decade, Oracle Database (Oracle DB) has reigned supreme in the competitive arena of database engine popularity ranking as shown in Figure 1 and Figure 2. This pervasiveness has led Oracle Database to be trusted by

React to this headline:

Loading spinner

Cracking the Giant: How ODAT Challenges Oracle, the King of Databases Read More »

The New Face of Ransomware: Key Players and Emerging Tactics of 2024

The New Face of Ransomware: Key Players and Emerging Tactics of 2024 2025-01-21 at 16:03 By Serhii Melnyk As we step into 2025, the high-impact, financially motivated ransomware landscape continues to evolve, shaped by a combination of law enforcement actions, shifting affiliate dynamics, advancements in defensive approaches, and broader economic and geopolitical influences. This article

React to this headline:

Loading spinner

The New Face of Ransomware: Key Players and Emerging Tactics of 2024 Read More »

The Database Slayer: Deep Dive and Simulation of the Xbash Malware

The Database Slayer: Deep Dive and Simulation of the Xbash Malware 2025-01-14 at 18:49 By Karl Biron In the world of malware, common ransomware schemes aim to take the data within databases (considered the “gold” in the vault of any organization) and hold them hostage, promising data recovery upon ransom payment. This article is an

React to this headline:

Loading spinner

The Database Slayer: Deep Dive and Simulation of the Xbash Malware Read More »

The State of Magecart: A Persistent Threat to E-Commerce Security

The State of Magecart: A Persistent Threat to E-Commerce Security 2025-01-09 at 16:04 By Phil Hay, Rodel Mendrez Trustwave SpiderLabs first blogged about Magecart back in 2019; fast forward five years and it is still here going strong. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

The State of Magecart: A Persistent Threat to E-Commerce Security Read More »

HHS Proposes Critical HIPAA Security Rule Updates to Combat Rising Cybersecurity Threats in Healthcare

HHS Proposes Critical HIPAA Security Rule Updates to Combat Rising Cybersecurity Threats in Healthcare 2025-01-06 at 21:46 By The Health and Human Services Office of Civil Rights (OCR) has launched an effort to improve cybersecurity measures for a wide variety of healthcare organizations. This article is an excerpt from Trustwave Blog View Original Source React to

React to this headline:

Loading spinner

HHS Proposes Critical HIPAA Security Rule Updates to Combat Rising Cybersecurity Threats in Healthcare Read More »

Trustwave’s 2025 Cybersecurity Predictions: Zero Trust and AI Regulation

Trustwave’s 2025 Cybersecurity Predictions: Zero Trust and AI Regulation 2024-12-27 at 16:01 By Darren Van Booven As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. This article is an excerpt from Trustwave Blog

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: Zero Trust and AI Regulation Read More »

Enhancing Cybersecurity in Higher Education: Trustwave and Curtin University’s Collaborative Journey

Enhancing Cybersecurity in Higher Education: Trustwave and Curtin University’s Collaborative Journey 2024-12-09 at 16:04 By The digital age has ushered in unprecedented opportunities for education, but it has also exposed institutions to an increasingly complex cyber threat landscape. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Enhancing Cybersecurity in Higher Education: Trustwave and Curtin University’s Collaborative Journey Read More »

Trustwave Launches Two New Microsoft Security Accelerators

Trustwave Launches Two New Microsoft Security Accelerators 2024-12-03 at 16:01 By Trustwave has launched two additional Microsoft Security accelerators designed to quickly increase an organization’s security maturity and identify potential cost-saving initiatives. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave Launches Two New Microsoft Security Accelerators Read More »

Why a Zero Trust Architecture Must Include Database Security

Why a Zero Trust Architecture Must Include Database Security 2024-11-27 at 16:03 By Whether the means of a cyber-attack are phishing, ransomware, advanced persistent threat, malware, or some combination, the target is ultimately the same: your data. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Why a Zero Trust Architecture Must Include Database Security Read More »

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS) 2024-11-26 at 18:33 By Diana Solomon and John Kevin Adriano Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) platforms, which are increasingly popular among threat actors. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS) Read More »

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime 2024-11-25 at 16:03 By Finding the exact price of any product is now easier than ever. A quick check with your favorite online retailer will show that a GE Profile Dryer goes for $989, a 10-pack of Play-Doh can be had for

React to this headline:

Loading spinner

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime Read More »

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data 2024-11-21 at 16:03 By The holiday season starts on Black Friday and is the busiest time of year for retailers, but it’s also a peak period for cybercriminals who look to exploit vulnerabilities in business of all sizes. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data Read More »

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching 2024-11-19 at 20:54 By There is no doubt about the value of conducting Managed Vulnerability Scanning. Trustwave has posted multiple blogs on the topic, (just check here, here, and here) for a look at how Trustwave approaches this very important cybersecurity procedure. This article is an excerpt

React to this headline:

Loading spinner

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching Read More »

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance 2024-11-14 at 22:03 By Let’s take a look at how traditional vulnerability assessment (VA) tools compare to those built specifically to assess database security. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance Read More »

Lessons from a Honeypot with US Citizens’ Data

Lessons from a Honeypot with US Citizens’ Data 2024-11-13 at 20:15 By Radoslaw Zdonczyk and Nikita Kazymirsky Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work investigating potential risks and threats to the election system, from disinformation campaigns to nation-state actors looking to exploit vulnerabilities. This article is an

React to this headline:

Loading spinner

Lessons from a Honeypot with US Citizens’ Data Read More »

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight 2024-11-13 at 16:03 By In today’s complex cybersecurity landscape, addressing the controls within the Australian Government’s Information Security Manual (ISM) and the Essential Eight (E8) is critical when seeking to build rapport and work with the Australian Government. Australian cybersecurity regulations like

React to this headline:

Loading spinner

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight Read More »

Scroll to Top