Emerging Threats

The Rise of Email Marketing Platforms for Business Email Compromise Attacks

The Rise of Email Marketing Platforms for Business Email Compromise Attacks 2025-02-18 at 21:49 By Maria Katrina Udquin In a statistical report published in September 2024 by the Federal Bureau of Investigation (FBI), it was revealed that more than US$55 billion was lost to business email compromise (BEC) attacks between October 2013 and December 2023. This profitability […]

React to this headline:

Loading spinner

The Rise of Email Marketing Platforms for Business Email Compromise Attacks Read More »

The Threat Within: Understanding the Role of Malicious Insiders in Cyberattacks

The Threat Within: Understanding the Role of Malicious Insiders in Cyberattacks 2025-02-13 at 20:33 By Understanding Insider Threats: Learn how insider threats in the financial sector have evolved, driven by malicious insiders and cybercriminals leveraging employee access for harmful purposes. Factors Driving Malicious Behavior: Discover the key motivations behind insider threats, from financial gain to personal grievances

React to this headline:

Loading spinner

The Threat Within: Understanding the Role of Malicious Insiders in Cyberattacks Read More »

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge 2025-02-04 at 22:48 By Two newcomers have made their way onto the ransomware threat group stage, becoming the biggest threat to the energy and utilities sector in 2025. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge Read More »

Beyond the Chatbot: Meta Phishing with Fake Live Support

Beyond the Chatbot: Meta Phishing with Fake Live Support 2025-02-04 at 16:03 By Mike Casayuran and John Kevin Adriano In a previous Trustwave SpiderLabs’ blog, we explored how cybercriminals exploit Facebook Messenger chatbots to execute social engineering attacks, deceiving users into falling victim to scams and phishing schemes. These attacks often rely on the perceived legitimacy

React to this headline:

Loading spinner

Beyond the Chatbot: Meta Phishing with Fake Live Support Read More »

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats 2025-01-29 at 20:49 By This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. This article is an excerpt from Trustwave Blog View Original Source React to

React to this headline:

Loading spinner

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats Read More »

Ransomware’s Evolution: Key Threat Groups Targeting the Energy and Utilities Sector in 2025

Ransomware’s Evolution: Key Threat Groups Targeting the Energy and Utilities Sector in 2025 2025-01-24 at 16:02 By Ransomware has a long history, first established in 1989 with the introduction of the AIDS Trojan, of use by criminals to force organizations and regular people to hand over money. Trustwave SpiderLabs follows the continuously changing history of ransomware and those

React to this headline:

Loading spinner

Ransomware’s Evolution: Key Threat Groups Targeting the Energy and Utilities Sector in 2025 Read More »

Trustwave SpiderLabs: The Ransomware Trends Confronting the Energy and Utilities Sector

Trustwave SpiderLabs: The Ransomware Trends Confronting the Energy and Utilities Sector 2025-01-23 at 16:18 By Increasing frequency, new threat groups emerging, the rise of ransomware-as-a-service (RaaS) attack model, and third-party attacks are just a few of the dangerous trends Trustwave SpiderLabs details in Energy and Utilities Sector Deep Dive: Ransomware Trends. This article is an excerpt

React to this headline:

Loading spinner

Trustwave SpiderLabs: The Ransomware Trends Confronting the Energy and Utilities Sector Read More »

Trustwave SpiderLabs: Ransomware Attacks Against the Energy and Utilities Sector Up 80%

Trustwave SpiderLabs: Ransomware Attacks Against the Energy and Utilities Sector Up 80% 2025-01-22 at 16:15 By The energy sector is a cornerstone of national security, ensuring the delivery of critical infrastructure services and supporting transportation systems. Recognizing the importance of protecting this vital industry, Trustwave SpiderLabs has released the comprehensive 2025 Trustwave Risk Radar Report: Energy

React to this headline:

Loading spinner

Trustwave SpiderLabs: Ransomware Attacks Against the Energy and Utilities Sector Up 80% Read More »

Trustwave SpiderLabs 2025 Trustwave Risk Radar Report: Energy and Utilities Sector

Trustwave SpiderLabs 2025 Trustwave Risk Radar Report: Energy and Utilities Sector 2025-01-22 at 16:15 By The energy sector plays a crucial role in national security by ensuring the delivery of essential infrastructure services and supporting transportation systems. Acknowledging the need to safeguard this vital industry, Trustwave SpiderLabs has published the highly detailed 2025 Trustwave Risk Radar

React to this headline:

Loading spinner

Trustwave SpiderLabs 2025 Trustwave Risk Radar Report: Energy and Utilities Sector Read More »

The New Face of Ransomware: Key Players and Emerging Tactics of 2024

The New Face of Ransomware: Key Players and Emerging Tactics of 2024 2025-01-21 at 16:03 By Serhii Melnyk As we step into 2025, the high-impact, financially motivated ransomware landscape continues to evolve, shaped by a combination of law enforcement actions, shifting affiliate dynamics, advancements in defensive approaches, and broader economic and geopolitical influences. This article

React to this headline:

Loading spinner

The New Face of Ransomware: Key Players and Emerging Tactics of 2024 Read More »

How Generative AI is Shaping the Future of Cybersecurity: Key Insights for CISOs and Enterprises

How Generative AI is Shaping the Future of Cybersecurity: Key Insights for CISOs and Enterprises 2025-01-15 at 23:19 By The increasing adoption of generative artificial intelligence platforms by threat actors, cyber defenders, and the average organization will present enterprises with an unprecedented number of cybersecurity issues in the coming years, according to a new Gartner®

React to this headline:

Loading spinner

How Generative AI is Shaping the Future of Cybersecurity: Key Insights for CISOs and Enterprises Read More »

The Database Slayer: Deep Dive and Simulation of the Xbash Malware

The Database Slayer: Deep Dive and Simulation of the Xbash Malware 2025-01-14 at 18:49 By Karl Biron In the world of malware, common ransomware schemes aim to take the data within databases (considered the “gold” in the vault of any organization) and hold them hostage, promising data recovery upon ransom payment. This article is an

React to this headline:

Loading spinner

The Database Slayer: Deep Dive and Simulation of the Xbash Malware Read More »

The State of Magecart: A Persistent Threat to E-Commerce Security

The State of Magecart: A Persistent Threat to E-Commerce Security 2025-01-09 at 16:04 By Phil Hay, Rodel Mendrez Trustwave SpiderLabs first blogged about Magecart back in 2019; fast forward five years and it is still here going strong. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

The State of Magecart: A Persistent Threat to E-Commerce Security Read More »

Trustwave’s 2025 Cybersecurity Predictions: The Era of End-to-End AI Cyberattacks is Here

Trustwave’s 2025 Cybersecurity Predictions: The Era of End-to-End AI Cyberattacks is Here 2025-01-07 at 21:48 By Craig Searle As 2024 has wrapped up, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: The Era of End-to-End AI Cyberattacks is Here Read More »

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus 2024-12-30 at 18:18 By As always in cybersecurity, hardly a dull day went by in 2024. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus Read More »

Email Bombing: Why You Need to be Concerned

Email Bombing: Why You Need to be Concerned 2024-12-18 at 16:03 By Phil Hay Over the last few months, the topic of email bombing has been brought to our attention multiple times, mostly queries from customers that go something like this: This article is an excerpt from SpiderLabs Blog View Original Source React to this

React to this headline:

Loading spinner

Email Bombing: Why You Need to be Concerned Read More »

Trustwave’s 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges

Trustwave’s 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges 2024-12-17 at 17:39 By Kevin Kerr As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Here is the latest installment. This

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges Read More »

Analyzing Salt Typhoon: Telecom Attacker

Analyzing Salt Typhoon: Telecom Attacker 2024-12-12 at 23:34 By Unveiling Salt Typhoon: A New Wave in Cyber EspionageDiscover how this advanced Chinese-speaking threat actor targets telecom giants, using sophisticated tools like SparrowDoor and Demodex to breach and exfiltrate sensitive data. The Who, What, and Why of Salt Typhoon’s AttacksGain insights into Salt Typhoon’s history, tactics,

React to this headline:

Loading spinner

Analyzing Salt Typhoon: Telecom Attacker Read More »

Trustwave’s 2025 Cybersecurity Predictions: The Rise of Generative AI Data Breaches, Quantum Computing, and Cyber Warfare

Trustwave’s 2025 Cybersecurity Predictions: The Rise of Generative AI Data Breaches, Quantum Computing, and Cyber Warfare 2024-12-11 at 16:18 By Jesse Emerson As we look ahead to 2025, the cybersecurity landscape is poised for significant shifts and challenges. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: The Rise of Generative AI Data Breaches, Quantum Computing, and Cyber Warfare Read More »

‘Tis the Season for Artificial Intelligence-Generated Fraud Messages

‘Tis the Season for Artificial Intelligence-Generated Fraud Messages 2024-12-10 at 16:19 By The FBI issued an advisory on December 3rd warning the public of how threat actors use generative AI to more quickly and efficiently create messaging to defraud their victims, echoing earlier warnings issued by Trustwave SpiderLabs. This article is an excerpt from Trustwave Blog

React to this headline:

Loading spinner

‘Tis the Season for Artificial Intelligence-Generated Fraud Messages Read More »

Scroll to Top