Security Research

How Dark Web Travel Agencies and Fraud Impact the Hospitality Industry

How Dark Web Travel Agencies and Fraud Impact the Hospitality Industry 2025-05-23 at 16:04 By Dark Web Travel Agencies: Discover how stolen hospitality data fuels fraudulent bookings and impacts customers. From Breach to Booking Abuse: Learn the lifecycle of stolen hotel data and its exploitation on the dark web. Trustwave SpiderLabs’ just released Deep Dive: How Threat Actors […]

React to this headline:

Loading spinner

How Dark Web Travel Agencies and Fraud Impact the Hospitality Industry Read More »

Deep Dive: A DFIR Case Study in Hospitality

Deep Dive: A DFIR Case Study in Hospitality 2025-05-22 at 16:03 By Phishing in Hospitality: Real-world case study reveals how QR codes and fake e-signatures target hotel employees. Inside a Hotel Cyberattack: Learn DFIR tactics used to analyze and respond to phishing attempts against hospitality targets. Protect your Hospitality Business: Actionable insights from a 2024 phishing case study

React to this headline:

Loading spinner

Deep Dive: A DFIR Case Study in Hospitality Read More »

Trustwave SpiderLabs Report Highlights Ransomware and Dark Web Dangers for the Hospitality Sector

Trustwave SpiderLabs Report Highlights Ransomware and Dark Web Dangers for the Hospitality Sector 2025-05-21 at 16:07 By New Trustwave SpiderLabs report reveals rising ransomware and dark web risks for hotels. Understand the dark web connection and key vulnerabilities in the hospitality sector. Arm your hospitality business against evolving travel scams & ransomware – download the

React to this headline:

Loading spinner

Trustwave SpiderLabs Report Highlights Ransomware and Dark Web Dangers for the Hospitality Sector Read More »

Hospitality Under Attack: New Trustwave Report Highlights Cybersecurity Challenges in 2025

Hospitality Under Attack: New Trustwave Report Highlights Cybersecurity Challenges in 2025 2025-05-21 at 16:07 By As the summer travel season approaches, travelers worldwide are busy booking their holidays, entrusting the hospitality industry with some of their most sensitive personal and financial information. Unfortunately, this makes the sector a prime target for threat actors looking to

React to this headline:

Loading spinner

Hospitality Under Attack: New Trustwave Report Highlights Cybersecurity Challenges in 2025 Read More »

Get Ready for the 2025 Trustwave Risk Radar Report – Hospitality Sector

Get Ready for the 2025 Trustwave Risk Radar Report – Hospitality Sector 2025-05-14 at 19:47 By Trustwave SpiderLabs’ upcoming report, the 2025 Trustwave Risk Radar Report: Hospitality Sector, will be released on May 21 and will delve into the latest threat landscape, highlighting critical vulnerabilities and offering actionable insights to help hospitality businesses stay secure. This

React to this headline:

Loading spinner

Get Ready for the 2025 Trustwave Risk Radar Report – Hospitality Sector Read More »

UK Cyber Security Survey 2025: Ransomware on the Rise, Phishing Still Reigns

UK Cyber Security Survey 2025: Ransomware on the Rise, Phishing Still Reigns 2025-05-07 at 16:12 By Key findings from the 2025 Cyber Security Breaches Survey on ransomware and phishing. 43% of UK businesses experienced a cyber breach in 2024—phishing and ransomware remain dominant threats Cyber hygiene is improving, but supply chain risks and board engagement

React to this headline:

Loading spinner

UK Cyber Security Survey 2025: Ransomware on the Rise, Phishing Still Reigns Read More »

Lights Out and Stalled Factories: Using M.A.T.R.I.X to Learn About Modbus Vulnerabilities

Lights Out and Stalled Factories: Using M.A.T.R.I.X to Learn About Modbus Vulnerabilities 2025-05-06 at 18:47 By Karl Biron Let’s explore the critical role of Modbus in energy and manufacturing systems, then demonstrate real-world exploitation techniques using Docker-based simulations and the custom-built Python tool M.A.T.R.I.X. This article is an excerpt from SpiderLabs Blog View Original Source

React to this headline:

Loading spinner

Lights Out and Stalled Factories: Using M.A.T.R.I.X to Learn About Modbus Vulnerabilities Read More »

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider 2025-05-02 at 19:32 By The UK retail market has been thrown into turmoil in recent weeks, with three of that nation’s highest-profile retailers being targeted allegedly by the well-known threat group Scattered Spider in at least one of the most disruptive incidents. This article is an

React to this headline:

Loading spinner

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider Read More »

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse 2025-04-08 at 16:29 By Serhii Melnyk and Nikita Kazymirskyi In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta, a prolific ransomware group. This article is an excerpt from SpiderLabs Blog View Original Source React to this

React to this headline:

Loading spinner

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse Read More »

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need for

React to this headline:

Loading spinner

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report Read More »

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need

React to this headline:

Loading spinner

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures Read More »

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats 2025-03-21 at 15:07 By With subject matter expertise and presence across the globe, RMI Global Solutions are recognized by the oil & gas, and broader energy industry on and offshore, as experts in the threats and risks that face the spectrum of this key industry

React to this headline:

Loading spinner

The Energy Industry’s Hidden Risks: Espionage, Sabotage, and Insider Threats Read More »

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 2025-03-20 at 18:47 By Karl Biron In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster, we uncovered the dangers of running Elasticsearch with X-Pack disabled and thus, highlighting the ease with which attackers

React to this headline:

Loading spinner

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2 Read More »

Russian State Actors: Development in Group Attributions

Russian State Actors: Development in Group Attributions 2025-03-07 at 16:33 By Pawel Knapczyk and Nikita Kazymirskyi This is the final installment of Trustwave SpiderLabs Russia-Ukraine digital battlefield series, which has spanned topics including the differences between Russia and Ukraine cyber actors, how government entities, defense organizations, and human targets were caught in the cyber crossfire,

React to this headline:

Loading spinner

Russian State Actors: Development in Group Attributions Read More »

A Deep Dive into Strela Stealer and how it Targets European Countries

A Deep Dive into Strela Stealer and how it Targets European Countries 2025-03-07 at 00:01 By Dawid Nesterowicz Infostealers have dominated the malware landscape due to the ease of threat operations maintenance, and a wide group of potential victims. In this blog, we take a closer look at a unique infostealer designed to precisely target

React to this headline:

Loading spinner

A Deep Dive into Strela Stealer and how it Targets European Countries Read More »

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond 2025-03-06 at 19:34 By Cyber Threats in Manufacturing: The 2025 Trustwave Risk Radar Report highlights how cybercriminals exploit vulnerabilities in manufacturing infrastructure, workers, and digital supply chains, with over 3,500 critical vulnerabilities listed on CISA’s KEV list. Top Manufacturing Cyber Risks: Attackers leverage high-profile exploits

React to this headline:

Loading spinner

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond Read More »

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure 2025-03-05 at 16:08 By Pawel Knapczyk and Nikita Kazymirskyi This post is the third part of our blog series that tackles the Russia-Ukraine war in the digital realm. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure Read More »

Attacks Against Government Entities, Defense Sector, and Human Targets

Attacks Against Government Entities, Defense Sector, and Human Targets 2025-02-25 at 17:08 By Pawel Knapczyk and Nikita Kazymirskyi In the first part of Trustwave SpiderLabs’ Russia-Ukraine war blog series, we gave a brief look at our major findings as well as the main differences between how Russia and Ukraine wage attacks in the digital frontlines. In

React to this headline:

Loading spinner

Attacks Against Government Entities, Defense Sector, and Human Targets Read More »

Beyond the Chatbot: Meta Phishing with Fake Live Support

Beyond the Chatbot: Meta Phishing with Fake Live Support 2025-02-04 at 16:03 By Mike Casayuran and John Kevin Adriano In a previous Trustwave SpiderLabs’ blog, we explored how cybercriminals exploit Facebook Messenger chatbots to execute social engineering attacks, deceiving users into falling victim to scams and phishing schemes. These attacks often rely on the perceived legitimacy

React to this headline:

Loading spinner

Beyond the Chatbot: Meta Phishing with Fake Live Support Read More »

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats 2025-01-29 at 20:49 By This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. This article is an excerpt from Trustwave Blog View Original Source React to

React to this headline:

Loading spinner

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats Read More »

Scroll to Top