Perspectives

To Report or Not to Report Ransom Payments – Possibly Not Worth the Effort

To Report or Not to Report Ransom Payments – Possibly Not Worth the Effort 2025-07-03 at 16:03 By Craig Searle Just a recap – Trustwave in no way endorses ransom payments. We believe the best way to deal with a ransomware situation is to: This article is an excerpt from Trustwave Blog View Original Source […]

React to this headline:

Loading spinner

To Report or Not to Report Ransom Payments – Possibly Not Worth the Effort Read More »

To Report or Not to Report Ransom Payments – A Helpful and Useful Idea

To Report or Not to Report Ransom Payments – A Helpful and Useful Idea 2025-07-03 at 16:03 By Ed Williams Just a recap – Trustwave in no way endorses ransom payments. We believe the best way to deal with a ransomware situation is to: This article is an excerpt from Trustwave Blog View Original Source

React to this headline:

Loading spinner

To Report or Not to Report Ransom Payments – A Helpful and Useful Idea Read More »

To Report or Not to Report Ransom Payments – Two Diverging Opinions

To Report or Not to Report Ransom Payments – Two Diverging Opinions 2025-07-03 at 16:03 By This article is part of a three-part Trustwave series examining the efficacy of recently implemented and proposed government regulations requiring organizations victimized by ransomware to report if they make a ransom payment. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

To Report or Not to Report Ransom Payments – Two Diverging Opinions Read More »

The Digital Front Line: Israel and Iran Turn the Internet into a Covert Combat Zone

The Digital Front Line: Israel and Iran Turn the Internet into a Covert Combat Zone 2025-06-18 at 22:47 By The Israel-Iran conflict is barely a week old, but the security repercussions for the two combatants and the wider global community can already be seen as the cyberwarfare portion of the conflict is already spilling over

React to this headline:

Loading spinner

The Digital Front Line: Israel and Iran Turn the Internet into a Covert Combat Zone Read More »

9 Critical Questions to Ask When Choosing an MDR Provider

9 Critical Questions to Ask When Choosing an MDR Provider 2025-06-13 at 16:03 By Managed Detection and Response (MDR) providers are indispensable to organizations seeking to bolster their cybersecurity posture. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

9 Critical Questions to Ask When Choosing an MDR Provider Read More »

Red Teaming Around the World (UK and Europe vs. US)

Red Teaming Around the World (UK and Europe vs. US) 2025-06-02 at 20:36 By Philip Pieterse Regional Nuances: Explore the key differences in Red Teaming approaches across the UK, Europe, and the US, including regulatory frameworks and threat modeling. Red Team vs. Penetration Testing: Understand the distinct objectives, scopes, and durations of Red Team engagements compared to pen

React to this headline:

Loading spinner

Red Teaming Around the World (UK and Europe vs. US) Read More »

Navigating the Boardroom: Elevating Cybersecurity Conversations with Leadership

Navigating the Boardroom: Elevating Cybersecurity Conversations with Leadership 2025-05-27 at 16:04 By It’s almost a tradition in cybersecurity circles to say the Board of Directors’ ignorance or indifference on the topic is one of the biggest impediments an organization must overcome to have better security. This article is an excerpt from Trustwave Blog View Original Source

React to this headline:

Loading spinner

Navigating the Boardroom: Elevating Cybersecurity Conversations with Leadership Read More »

Why Microsoft Email Security Benefits from a Layered Approach

Why Microsoft Email Security Benefits from a Layered Approach 2025-05-02 at 16:03 By Doug Olenick The best secure email gateways mimic the tried and true “defense in depth” cybersecurity strategy by using a layered approach, including advanced features that make effective use of AI. This article is an excerpt from Trustwave Blog View Original Source

React to this headline:

Loading spinner

Why Microsoft Email Security Benefits from a Layered Approach Read More »

A Deep-Rooted Infestation: How the ILOVEYOU Bug Continues its Legacy in Modern Worms

A Deep-Rooted Infestation: How the ILOVEYOU Bug Continues its Legacy in Modern Worms 2025-05-02 at 16:03 By Pauline Bolaños A quarter century ago, a former computer science student from the Philippines accidentally unleashed one of the most destructive computer viruses in modern history. This article is an excerpt from SpiderLabs Blog View Original Source React

React to this headline:

Loading spinner

A Deep-Rooted Infestation: How the ILOVEYOU Bug Continues its Legacy in Modern Worms Read More »

Top Online Shopping Tips for Retailers and Consumers

Top Online Shopping Tips for Retailers and Consumers 2025-04-21 at 17:07 By Stay Safe While You Shop: Learn how to avoid common online shopping scams and protect your payment information. Expert Insights: Discover practical tips from cybersecurity professionals on secure payment methods and fraud prevention. Retailer Best Practices: Find out how businesses can strengthen their

React to this headline:

Loading spinner

Top Online Shopping Tips for Retailers and Consumers Read More »

Babuk2 Bjorka: The Evolution of Ransomware for ‘Data Commoditization’

Babuk2 Bjorka: The Evolution of Ransomware for ‘Data Commoditization’ 2025-04-02 at 00:15 By John Basmayor An investigation that started with a tip from one of our threat intel sources about the revival of the Babuk (figure 1) threat group has led Trustwave SpiderLabs to uncover what appears to be a paradigm shift in the ransomware

React to this headline:

Loading spinner

Babuk2 Bjorka: The Evolution of Ransomware for ‘Data Commoditization’ Read More »

Challenges for Australian Manufacturers: Insights from the 2025 Trustwave Risk Radar Report

Challenges for Australian Manufacturers: Insights from the 2025 Trustwave Risk Radar Report 2025-03-13 at 17:48 By The Trustwave SpiderLabs research 2025 Trustwave Risk Radar Report: Manufacturing Sector takes a global view of the cybersecurity issues facing this vertical, but it’s also important to examine how and if different regions are specifically impacted. This article is an excerpt

React to this headline:

Loading spinner

Challenges for Australian Manufacturers: Insights from the 2025 Trustwave Risk Radar Report Read More »

Russian State Actors: Development in Group Attributions

Russian State Actors: Development in Group Attributions 2025-03-07 at 16:33 By Pawel Knapczyk and Nikita Kazymirskyi This is the final installment of Trustwave SpiderLabs Russia-Ukraine digital battlefield series, which has spanned topics including the differences between Russia and Ukraine cyber actors, how government entities, defense organizations, and human targets were caught in the cyber crossfire,

React to this headline:

Loading spinner

Russian State Actors: Development in Group Attributions Read More »

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement 2025-03-04 at 16:18 By Lisel Newton The following is a guest blog by Lisel Newton, Executive Director, Information Security, Risk & Compliance at Gossamer Bio. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement Read More »

Attacks Against Government Entities, Defense Sector, and Human Targets

Attacks Against Government Entities, Defense Sector, and Human Targets 2025-02-25 at 17:08 By Pawel Knapczyk and Nikita Kazymirskyi In the first part of Trustwave SpiderLabs’ Russia-Ukraine war blog series, we gave a brief look at our major findings as well as the main differences between how Russia and Ukraine wage attacks in the digital frontlines. In

React to this headline:

Loading spinner

Attacks Against Government Entities, Defense Sector, and Human Targets Read More »

Will the UK’s Ransomware Proposal Work? Trustwave Weighs in on the Potential Impact

Will the UK’s Ransomware Proposal Work? Trustwave Weighs in on the Potential Impact 2025-02-06 at 22:03 By The recent UK Home Office proposal designed to hinder and disrupt ransomware operations through several proposed measures, including a targeted ban on ransomware payments, has again brought this question into the public square. The question of whether to pay a

React to this headline:

Loading spinner

Will the UK’s Ransomware Proposal Work? Trustwave Weighs in on the Potential Impact Read More »

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus 2024-12-30 at 18:18 By As always in cybersecurity, hardly a dull day went by in 2024. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus Read More »

Trustwave’s 2025 Cybersecurity Predictions: Zero Trust and AI Regulation

Trustwave’s 2025 Cybersecurity Predictions: Zero Trust and AI Regulation 2024-12-27 at 16:01 By Darren Van Booven As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. This article is an excerpt from Trustwave Blog

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: Zero Trust and AI Regulation Read More »

Trustwave’s 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges

Trustwave’s 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges 2024-12-17 at 17:39 By Kevin Kerr As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Here is the latest installment. This

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges Read More »

Trustwave’s 2025 Cybersecurity Predictions: Digital Fatigue and Deepfakes

Trustwave’s 2025 Cybersecurity Predictions: Digital Fatigue and Deepfakes 2024-12-13 at 16:04 By Damian Archer Digital Fatigue Given the current political and social environment globally, we will start seeing a more noticeable amount of digital fatigue. This fatigue will lead to more people disconnecting completely when outside of work. This article is an excerpt from Trustwave

React to this headline:

Loading spinner

Trustwave’s 2025 Cybersecurity Predictions: Digital Fatigue and Deepfakes Read More »

Scroll to Top