Security Research

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need for […]

React to this headline:

Loading spinner

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report Read More »

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need

React to this headline:

Loading spinner

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures Read More »

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats 2025-03-21 at 15:07 By With subject matter expertise and presence across the globe, RMI Global Solutions are recognized by the oil & gas, and broader energy industry on and offshore, as experts in the threats and risks that face the spectrum of this key industry

React to this headline:

Loading spinner

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats Read More »

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 2025-03-20 at 18:47 By Karl Biron In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster, we uncovered the dangers of running Elasticsearch with X-Pack disabled and thus, highlighting the ease with which attackers

React to this headline:

Loading spinner

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 Read More »

Russian State Actors: Development in Group Attributions

Russian State Actors: Development in Group Attributions 2025-03-07 at 16:33 By Pawel Knapczyk and Nikita Kazymirskyi This is the final installment of Trustwave SpiderLabs Russia-Ukraine digital battlefield series, which has spanned topics including the differences between Russia and Ukraine cyber actors, how government entities, defense organizations, and human targets were caught in the cyber crossfire,

React to this headline:

Loading spinner

Russian State Actors: Development in Group Attributions Read More »

A Deep Dive into Strela Stealer and how it Targets European Countries

A Deep Dive into Strela Stealer and how it Targets European Countries 2025-03-07 at 00:01 By Dawid Nesterowicz Infostealers have dominated the malware landscape due to the ease of threat operations maintenance, and a wide group of potential victims. In this blog, we take a closer look at a unique infostealer designed to precisely target

React to this headline:

Loading spinner

A Deep Dive into Strela Stealer and how it Targets European Countries Read More »

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond 2025-03-06 at 19:34 By Cyber Threats in Manufacturing: The 2025 Trustwave Risk Radar Report highlights how cybercriminals exploit vulnerabilities in manufacturing infrastructure, workers, and digital supply chains, with over 3,500 critical vulnerabilities listed on CISA’s KEV list. Top Manufacturing Cyber Risks: Attackers leverage high-profile exploits

React to this headline:

Loading spinner

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond Read More »

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure 2025-03-05 at 16:08 By Pawel Knapczyk and Nikita Kazymirskyi This post is the third part of our blog series that tackles the Russia-Ukraine war in the digital realm. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure Read More »

Attacks Against Government Entities, Defense Sector, and Human Targets

Attacks Against Government Entities, Defense Sector, and Human Targets 2025-02-25 at 17:08 By Pawel Knapczyk and Nikita Kazymirskyi In the first part of Trustwave SpiderLabs’ Russia-Ukraine war blog series, we gave a brief look at our major findings as well as the main differences between how Russia and Ukraine wage attacks in the digital frontlines. In

React to this headline:

Loading spinner

Attacks Against Government Entities, Defense Sector, and Human Targets Read More »

Beyond the Chatbot: Meta Phishing with Fake Live Support

Beyond the Chatbot: Meta Phishing with Fake Live Support 2025-02-04 at 16:03 By Mike Casayuran and John Kevin Adriano In a previous Trustwave SpiderLabs’ blog, we explored how cybercriminals exploit Facebook Messenger chatbots to execute social engineering attacks, deceiving users into falling victim to scams and phishing schemes. These attacks often rely on the perceived legitimacy

React to this headline:

Loading spinner

Beyond the Chatbot: Meta Phishing with Fake Live Support Read More »

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats 2025-01-29 at 20:49 By This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. This article is an excerpt from Trustwave Blog View Original Source React to

React to this headline:

Loading spinner

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats Read More »

CVE-2024-55591: Fortinet FortiOS/FortiProxy Zero Day

CVE-2024-55591: Fortinet FortiOS/FortiProxy Zero Day 2025-01-14 at 21:07 By In late November and December 2024, Artic Wolf observed evidence of a mass compromise of Fortinet FortiGate. While the initial attack vector was unknown at the time, evidence of compromise (with new users and SSL profiles) was consistent across compromised devices. This article is an excerpt from SpiderLabs

React to this headline:

Loading spinner

CVE-2024-55591: Fortinet FortiOS/FortiProxy Zero Day Read More »

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus 2024-12-30 at 18:18 By As always in cybersecurity, hardly a dull day went by in 2024. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

From Retail Rampages to 2FA Fails: Trustwave’s Wild Ride Through the 2024 Cybersecurity Circus Read More »

Email Bombing: Why You Need to be Concerned

Email Bombing: Why You Need to be Concerned 2024-12-18 at 16:03 By Phil Hay Over the last few months, the topic of email bombing has been brought to our attention multiple times, mostly queries from customers that go something like this: This article is an excerpt from SpiderLabs Blog View Original Source React to this

React to this headline:

Loading spinner

Email Bombing: Why You Need to be Concerned Read More »

CVE-2024-11477: 7-Zip Flaw Allows Remote Code Execution

CVE-2024-11477: 7-Zip Flaw Allows Remote Code Execution 2024-11-27 at 18:50 By Pauline Bolaños On November 20th, 2024, Zero Day Initiative (ZDI) researchers disclosed a critical flaw in 7-Zip. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

CVE-2024-11477: 7-Zip Flaw Allows Remote Code Execution Read More »

Rockstar 2FA Phishing-as-a-Service (PaaS): Noteworthy Email Campaigns

Rockstar 2FA Phishing-as-a-Service (PaaS): Noteworthy Email Campaigns 2024-11-27 at 16:03 By Diana Solomon and John Kevin Adriano Welcome to the second part of our investigation into the Rockstar kit, please check out part one here. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Rockstar 2FA Phishing-as-a-Service (PaaS): Noteworthy Email Campaigns Read More »

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS)

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS) 2024-11-26 at 18:33 By Diana Solomon and John Kevin Adriano Trustwave SpiderLabs has been actively monitoring the rise of Phishing-as-a-Service (PaaS) platforms, which are increasingly popular among threat actors. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Rockstar 2FA: A Driving Force in Phishing-as-a-Service (PaaS) Read More »

Lessons from a Honeypot with US Citizens’ Data

Lessons from a Honeypot with US Citizens’ Data 2024-11-13 at 20:15 By Radoslaw Zdonczyk and Nikita Kazymirsky Prior to last week’s US Presidential Election, the Trustwave SpiderLabs team was hard at work investigating potential risks and threats to the election system, from disinformation campaigns to nation-state actors looking to exploit vulnerabilities. This article is an

React to this headline:

Loading spinner

Lessons from a Honeypot with US Citizens’ Data Read More »

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers 2024-11-07 at 16:03 By This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. This article is an excerpt from Trustwave Blog View Original Source React

React to this headline:

Loading spinner

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers Read More »

Buy Me A Coffee
Thank you for visiting!