Database Protection

The Database Slayer: Deep Dive and Simulation of the Xbash Malware

The Database Slayer: Deep Dive and Simulation of the Xbash Malware 2025-01-14 at 18:49 By Karl Biron In the world of malware, common ransomware schemes aim to take the data within databases (considered the “gold” in the vault of any organization) and hold them hostage, promising data recovery upon ransom payment. This article is an […]

React to this headline:

Loading spinner

The Database Slayer: Deep Dive and Simulation of the Xbash Malware Read More »

The State of Magecart: A Persistent Threat to E-Commerce Security

The State of Magecart: A Persistent Threat to E-Commerce Security 2025-01-09 at 16:04 By Phil Hay, Rodel Mendrez Trustwave SpiderLabs first blogged about Magecart back in 2019; fast forward five years and it is still here going strong. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

The State of Magecart: A Persistent Threat to E-Commerce Security Read More »

HHS Proposes Critical HIPAA Security Rule Updates to Combat Rising Cybersecurity Threats in Healthcare

HHS Proposes Critical HIPAA Security Rule Updates to Combat Rising Cybersecurity Threats in Healthcare 2025-01-06 at 21:46 By The Health and Human Services Office of Civil Rights (OCR) has launched an effort to improve cybersecurity measures for a wide variety of healthcare organizations. This article is an excerpt from Trustwave Blog View Original Source React to

React to this headline:

Loading spinner

HHS Proposes Critical HIPAA Security Rule Updates to Combat Rising Cybersecurity Threats in Healthcare Read More »

Trustwave’s 2025 Cybersecurity Predictions: Zero Trust and AI Regulation

Trustwave’s 2025 Cybersecurity Predictions: Zero Trust and AI Regulation 2024-12-27 at 16:01 By Darren Van Booven As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. This article is an excerpt from Trustwave Blog

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: Zero Trust and AI Regulation Read More »

Enhancing Cybersecurity in Higher Education: Trustwave and Curtin University’s Collaborative Journey

Enhancing Cybersecurity in Higher Education: Trustwave and Curtin University’s Collaborative Journey 2024-12-09 at 16:04 By The digital age has ushered in unprecedented opportunities for education, but it has also exposed institutions to an increasingly complex cyber threat landscape. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Enhancing Cybersecurity in Higher Education: Trustwave and Curtin University’s Collaborative Journey Read More »

Trustwave Launches Two New Microsoft Security Accelerators

Trustwave Launches Two New Microsoft Security Accelerators 2024-12-03 at 16:01 By Trustwave has launched two additional Microsoft Security accelerators designed to quickly increase an organization’s security maturity and identify potential cost-saving initiatives. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave Launches Two New Microsoft Security Accelerators Read More »

Why a Zero Trust Architecture Must Include Database Security

Why a Zero Trust Architecture Must Include Database Security 2024-11-27 at 16:03 By Whether the means of a cyber-attack are phishing, ransomware, advanced persistent threat, malware, or some combination, the target is ultimately the same: your data. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Why a Zero Trust Architecture Must Include Database Security Read More »

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS) 2024-11-26 at 18:33 By Diana Solomon and John Kevin Adriano Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) platforms, which are increasingly popular among threat actors. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS) Read More »

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime 2024-11-25 at 16:03 By Finding the exact price of any product is now easier than ever. A quick check with your favorite online retailer will show that a GE Profile Dryer goes for $989, a 10-pack of Play-Doh can be had for

React to this headline:

Loading spinner

How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime Read More »

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data 2024-11-21 at 16:03 By The holiday season starts on Black Friday and is the busiest time of year for retailers, but it’s also a peak period for cybercriminals who look to exploit vulnerabilities in business of all sizes. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Black Friday Cybersecurity Checklist: Safeguard Your Store and Customer Data Read More »

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching 2024-11-19 at 20:54 By There is no doubt about the value of conducting Managed Vulnerability Scanning. Trustwave has posted multiple blogs on the topic, (just check here, here, and here) for a look at how Trustwave approaches this very important cybersecurity procedure. This article is an excerpt

React to this headline:

Loading spinner

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching Read More »

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance 2024-11-14 at 22:03 By Let’s take a look at how traditional vulnerability assessment (VA) tools compare to those built specifically to assess database security. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Top Database Security Tools for Enhanced Vulnerability Assessment and Compliance Read More »

Lessons from a Honeypot with US Citizens’ Data

Lessons from a Honeypot with US Citizens’ Data 2024-11-13 at 20:15 By Radoslaw Zdonczyk and Nikita Kazymirsky Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work investigating potential risks and threats to the election system, from disinformation campaigns to nation-state actors looking to exploit vulnerabilities. This article is an

React to this headline:

Loading spinner

Lessons from a Honeypot with US Citizens’ Data Read More »

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight 2024-11-13 at 16:03 By In today’s complex cybersecurity landscape, addressing the controls within the Australian Government’s Information Security Manual (ISM) and the Essential Eight (E8) is critical when seeking to build rapport and work with the Australian Government. Australian cybersecurity regulations like

React to this headline:

Loading spinner

Beyond Compliance: Building a Resilient Security Strategy with the ISM and Essential Eight Read More »

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers 2024-11-07 at 16:03 By This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. This article is an excerpt from Trustwave Blog View Original Source React

React to this headline:

Loading spinner

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers Read More »

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare 2024-11-01 at 15:02 By With the rise in cyberattacks and ransomware incidents, healthcare organizations face an increasing risk of data breaches that threaten patient privacy and HIPAA compliance. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

$500,000 HHS Fine Underscores the Need for Security and Compliance in Healthcare Read More »

Ransomware Readiness: 10 Steps Every Organization Must Take

Ransomware Readiness: 10 Steps Every Organization Must Take 2024-10-18 at 18:31 By At the end of every year, the Trustwave content team asks its in-house experts what cybersecurity topics they predict will be top of mind in the coming 12 months, and inevitably the top answer is more ransomware. This article is an excerpt from

React to this headline:

Loading spinner

Ransomware Readiness: 10 Steps Every Organization Must Take Read More »

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack)

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack) 2024-10-17 at 22:04 By Karl Biron Introduction In the perpetually evolving field of cybersecurity, new threats materialize daily. Attackers are on the prowl for weaknesses in infrastructure and software like a cat eyeing its helpless prey. This article is an excerpt from

React to this headline:

Loading spinner

Feline Hackers Among Us? (A Deep Dive and Simulation of the Meow Attack) Read More »

How Microsoft E5 Security Helps Protect Healthcare and Patient Data

How Microsoft E5 Security Helps Protect Healthcare and Patient Data 2024-10-10 at 16:01 By In the healthcare industry, safeguarding patient data is not just a regulatory requirement but a moral imperative. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

How Microsoft E5 Security Helps Protect Healthcare and Patient Data Read More »

Trustwave’s 7-Step Guide to Building a Healthcare-Focused Cybersecurity Framework

Trustwave’s 7-Step Guide to Building a Healthcare-Focused Cybersecurity Framework 2024-10-02 at 17:01 By Healthcare organizations face increasing challenges in safeguarding patient data. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave’s 7-Step Guide to Building a Healthcare-Focused Cybersecurity Framework Read More »

Scroll to Top