Database Protection

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider 2025-05-02 at 19:32 By The UK retail market has been thrown into turmoil in recent weeks, with three of that nation’s highest-profile retailers being targeted allegedly by the well-known threat group Scattered Spider in at least one of the most disruptive incidents. This article is an […]

React to this headline:

Loading spinner

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider Read More »

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs 2025-04-30 at 16:03 By As detailed in the 2025 Trustwave Risk Radar Report, cybercriminals are increasingly targeting the manufacturing sector with sophisticated phishing tactics, exploiting both human behavior and trusted platforms. Trustwave SpiderLabs researchers uncover the most prevalent phishing lures—file-sharing notifications, HR documents, fake payment

React to this headline:

Loading spinner

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs Read More »

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions 2025-04-11 at 16:08 By Ed Williams AI and Energy Security: The UK’s Crucial Cybersecurity Challenge – Learn why safeguarding the energy sector is critical for the UK’s AI ambitions and technological leadership. Rising Cyber Threats: Ransomware and Legacy Systems in the Energy Sector –

React to this headline:

Loading spinner

Securing the Energy Sector: The Backbone of the UK’s AI Ambitions Read More »

Why Strong Passwords are Still the Best Defence Against Cyber Threats

Why Strong Passwords are Still the Best Defence Against Cyber Threats 2025-04-08 at 16:29 By Jason Whyte Weak passwords are a leading cause of cyber breaches, contributing to 86% of incidents. Strong password policies and practices significantly reduce the risk of attacks. Implementing additional measures like multifactor authentication (MFA) and password managers enhances security. After

React to this headline:

Loading spinner

Why Strong Passwords are Still the Best Defence Against Cyber Threats Read More »

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks 2025-04-01 at 16:04 By Barry O’Connell Insider threats are on the rise—understand how both intentional and unintentional risks impact your cybersecurity strategy. 40% of companies reported more insider-related incidents —learn how to detect and prevent insider threats before they cause damage. Strengthen your insider threat defense with a

React to this headline:

Loading spinner

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks Read More »

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity 2025-03-28 at 15:09 By Uncover Critical Cybersecurity Gaps: Learn how Trustwave SpiderLabs’ Red Team identified vulnerabilities in a US-based healthcare system. Real-World Red Team Insights: Explore key findings from simulated attacks that reveal how adversaries could compromise sensitive data. Healthcare Cybersecurity Trends: Access exclusive

React to this headline:

Loading spinner

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity Read More »

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups 2025-03-27 at 15:08 By Top Targets: Discover which healthcare segments ransomware attackers target the most. Threat Actors Exposed: Learn about the cybercriminal groups behind the biggest healthcare attacks. Real-World Impact: See how ransomware disrupts patient care, emergency services, and medical research. Ransomware remains the primary threat the

React to this headline:

Loading spinner

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups Read More »

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need for

React to this headline:

Loading spinner

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report Read More »

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need

React to this headline:

Loading spinner

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures Read More »

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats 2025-03-21 at 15:07 By With subject matter expertise and presence across the globe, RMI Global Solutions are recognized by the oil & gas, and broader energy industry on and offshore, as experts in the threats and risks that face the spectrum of this key industry

React to this headline:

Loading spinner

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats Read More »

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 2025-03-20 at 18:47 By Karl Biron In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster, we uncovered the dangers of running Elasticsearch with X-Pack disabled and thus, highlighting the ease with which attackers

React to this headline:

Loading spinner

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 Read More »

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1 2025-03-19 at 21:19 By Karl Biron Picture this: an always-awake, never-tired, high-speed librarian that instantly finds the exact information you need from a massive collection of books. This extraordinary librarian is also capable of processing millions of requests simultaneously, understands

React to this headline:

Loading spinner

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1 Read More »

Challenges for Australian Manufacturers: Insights from the 2025 Trustwave Risk Radar Report

Challenges for Australian Manufacturers: Insights from the 2025 Trustwave Risk Radar Report 2025-03-13 at 17:48 By The Trustwave SpiderLabs research 2025 Trustwave Risk Radar Report: Manufacturing Sector takes a global view of the cybersecurity issues facing this vertical, but it’s also important to examine how and if different regions are specifically impacted. This article is an excerpt

React to this headline:

Loading spinner

Challenges for Australian Manufacturers: Insights from the 2025 Trustwave Risk Radar Report Read More »

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector 2025-03-12 at 20:17 By Proactive Threat Defense for Financial Institutions: Trustwave’s DbProtect actively identifies sensitive data locations and analyzes potential threat vectors, enabling immediate security measures like enhanced access controls and vulnerability prioritization. Advanced Offensive Security Measures: Trustwave’s offensive security

React to this headline:

Loading spinner

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector Read More »

Is Your Organization’s Cloud Environment as Secure as You Think? Trustwave Can Help

Is Your Organization’s Cloud Environment as Secure as You Think? Trustwave Can Help 2025-03-11 at 22:04 By Organizations today face a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Which is why they need the security partners with the right tools that can help them make the correct

React to this headline:

Loading spinner

Is Your Organization’s Cloud Environment as Secure as You Think? Trustwave Can Help Read More »

Russian State Actors: Development in Group Attributions

Russian State Actors: Development in Group Attributions 2025-03-07 at 16:33 By Pawel Knapczyk and Nikita Kazymirskyi This is the final installment of Trustwave SpiderLabs Russia-Ukraine digital battlefield series, which has spanned topics including the differences between Russia and Ukraine cyber actors, how government entities, defense organizations, and human targets were caught in the cyber crossfire,

React to this headline:

Loading spinner

Russian State Actors: Development in Group Attributions Read More »

A Deep Dive into Strela Stealer and how it Targets European Countries

A Deep Dive into Strela Stealer and how it Targets European Countries 2025-03-07 at 00:01 By Dawid Nesterowicz Infostealers have dominated the malware landscape due to the ease of threat operations maintenance, and a wide group of potential victims. In this blog, we take a closer look at a unique infostealer designed to precisely target

React to this headline:

Loading spinner

A Deep Dive into Strela Stealer and how it Targets European Countries Read More »

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond 2025-03-06 at 19:34 By Cyber Threats in Manufacturing: The 2025 Trustwave Risk Radar Report highlights how cybercriminals exploit vulnerabilities in manufacturing infrastructure, workers, and digital supply chains, with over 3,500 critical vulnerabilities listed on CISA’s KEV list. Top Manufacturing Cyber Risks: Attackers leverage high-profile exploits

React to this headline:

Loading spinner

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond Read More »

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement 2025-03-04 at 16:18 By Lisel Newton The following is a guest blog by Lisel Newton, Executive Director, Information Security, Risk & Compliance at Gossamer Bio. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement Read More »

Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War

Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War 2025-02-21 at 00:01 By As the third anniversary of the start of the Russia-Ukraine war approaches, Trustwave SpiderLabs created a series of blog posts to look back, reflect upon, and explain how this 21st Century war is being fought not just on

React to this headline:

Loading spinner

Three Years of Cyber Warfare: How Digital Attacks Have Shaped the Russia-Ukraine War Read More »

Scroll to Top