Database Protection

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions 2025-04-11 at 16:08 By Ed Williams AI and Energy Security: The UK’s Crucial Cybersecurity Challenge – Learn why safeguarding the energy sector is critical for the UK’s AI ambitions and technological leadership. Rising Cyber Threats: Ransomware and Legacy Systems in the Energy Sector – […]

React to this headline:

Loading spinner

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions Read More »

Why Strong Passwords are Still the Best Defence Against Cyber Threats

Why Strong Passwords are Still the Best Defence Against Cyber Threats 2025-04-08 at 16:29 By Jason Whyte Weak passwords are a leading cause of cyber breaches, contributing to 86% of incidents. Strong password policies and practices significantly reduce the risk of attacks. Implementing additional measures like multifactor authentication (MFA) and password managers enhances security. After

React to this headline:

Loading spinner

Why Strong Passwords are Still the Best Defence Against Cyber Threats Read More »

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks 2025-04-01 at 16:04 By Barry O’Connell Insider threats are on the rise—understand how both intentional and unintentional risks impact your cybersecurity strategy. 40% of companies reported more insider-related incidents —learn how to detect and prevent insider threats before they cause damage. Strengthen your insider threat defense with a

React to this headline:

Loading spinner

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks Read More »

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity 2025-03-28 at 15:09 By Uncover Critical Cybersecurity Gaps: Learn how Trustwave SpiderLabs’ Red Team identified vulnerabilities in a US-based healthcare system. Real-World Red Team Insights: Explore key findings from simulated attacks that reveal how adversaries could compromise sensitive data. Healthcare Cybersecurity Trends: Access exclusive

React to this headline:

Loading spinner

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity Read More »

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups 2025-03-27 at 15:08 By Top Targets: Discover which healthcare segments ransomware attackers target the most. Threat Actors Exposed: Learn about the cybercriminal groups behind the biggest healthcare attacks. Real-World Impact: See how ransomware disrupts patient care, emergency services, and medical research. Ransomware remains the primary threat the

React to this headline:

Loading spinner

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups Read More »

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need for

React to this headline:

Loading spinner

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report Read More »

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need

React to this headline:

Loading spinner

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures Read More »

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats 2025-03-21 at 15:07 By With subject matter expertise and presence across the globe, RMI Global Solutions are recognized by the oil & gas, and broader energy industry on and offshore, as experts in the threats and risks that face the spectrum of this key industry

React to this headline:

Loading spinner

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats Read More »

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 2025-03-20 at 18:47 By Karl Biron In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster, we uncovered the dangers of running Elasticsearch with X-Pack disabled and thus, highlighting the ease with which attackers

React to this headline:

Loading spinner

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 Read More »

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1 2025-03-19 at 21:19 By Karl Biron Picture this: an always-awake, never-tired, high-speed librarian that instantly finds the exact information you need from a massive collection of books. This extraordinary librarian is also capable of processing millions of requests simultaneously, understands

React to this headline:

Loading spinner

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1 Read More »

Challenges for Australian Manufacturers: Insights from the 2025 Trustwave Risk Radar Report

Challenges for Australian Manufacturers: Insights from the 2025 Trustwave Risk Radar Report 2025-03-13 at 17:48 By The Trustwave SpiderLabs research 2025 Trustwave Risk Radar Report: Manufacturing Sector takes a global view of the cybersecurity issues facing this vertical, but it’s also important to examine how and if different regions are specifically impacted. This article is an excerpt

React to this headline:

Loading spinner

Challenges for Australian Manufacturers: Insights from the 2025 Trustwave Risk Radar Report Read More »

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector 2025-03-12 at 20:17 By Proactive Threat Defense for Financial Institutions: Trustwave’s DbProtect actively identifies sensitive data locations and analyzes potential threat vectors, enabling immediate security measures like enhanced access controls and vulnerability prioritization. Advanced Offensive Security Measures: Trustwave’s offensive security

React to this headline:

Loading spinner

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector Read More »

Is Your Organization’s Cloud Environment as Secure as You Think? Trustwave Can Help

Is Your Organization’s Cloud Environment as Secure as You Think? Trustwave Can Help 2025-03-11 at 22:04 By Organizations today face a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Which is why they need the security partners with the right tools that can help them make the correct

React to this headline:

Loading spinner

Is Your Organization’s Cloud Environment as Secure as You Think? Trustwave Can Help Read More »

Russian State Actors: Development in Group Attributions

Russian State Actors: Development in Group Attributions 2025-03-07 at 16:33 By Pawel Knapczyk and Nikita Kazymirskyi This is the final installment of Trustwave SpiderLabs Russia-Ukraine digital battlefield series, which has spanned topics including the differences between Russia and Ukraine cyber actors, how government entities, defense organizations, and human targets were caught in the cyber crossfire,

React to this headline:

Loading spinner

Russian State Actors: Development in Group Attributions Read More »

A Deep Dive into Strela Stealer and how it Targets European Countries

A Deep Dive into Strela Stealer and how it Targets European Countries 2025-03-07 at 00:01 By Dawid Nesterowicz Infostealers have dominated the malware landscape due to the ease of threat operations maintenance, and a wide group of potential victims. In this blog, we take a closer look at a unique infostealer designed to precisely target

React to this headline:

Loading spinner

A Deep Dive into Strela Stealer and how it Targets European Countries Read More »

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond 2025-03-06 at 19:34 By Cyber Threats in Manufacturing: The 2025 Trustwave Risk Radar Report highlights how cybercriminals exploit vulnerabilities in manufacturing infrastructure, workers, and digital supply chains, with over 3,500 critical vulnerabilities listed on CISA’s KEV list. Top Manufacturing Cyber Risks: Attackers leverage high-profile exploits

React to this headline:

Loading spinner

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond Read More »

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement 2025-03-04 at 16:18 By Lisel Newton The following is a guest blog by Lisel Newton, Executive Director, Information Security, Risk & Compliance at Gossamer Bio. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement Read More »

Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War

Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War 2025-02-21 at 00:01 By As the third anniversary of the start of the Russia-Ukraine war approaches, Trustwave SpiderLabs created a series of blog posts to look back, reflect upon, and explain how this 21st Century war is being fought not just on

React to this headline:

Loading spinner

Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War Read More »

Cyber and Physical Security Considerations for Returning to the Office

Cyber and Physical Security Considerations for Returning to the Office 2025-02-11 at 16:01 By Kory Daniels When remote work became mandatory in the wake of the 2020 COVID pandemic, organizations had to quickly dispatch staffers to their homes with all the equipment, and services, they would need to do their jobs. This article is an

React to this headline:

Loading spinner

Cyber and Physical Security Considerations for Returning to the Office Read More »

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge 2025-02-04 at 22:48 By Two newcomers have made their way onto the ransomware threat group stage, becoming the biggest threat to the energy and utilities sector in 2025. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge Read More »

Scroll to Top