Threat Intelligence

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider 2025-05-02 at 19:32 By The UK retail market has been thrown into turmoil in recent weeks, with three of that nation’s highest-profile retailers being targeted allegedly by the well-known threat group Scattered Spider in at least one of the most disruptive incidents. This article is an […]

React to this headline:

Loading spinner

Trustwave SpiderLabs’ Insights, History, and Mitigations for Scattered Spider Read More »

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy 2025-04-25 at 15:53 By Danelle Au With over 12,000 breaches analyzed, this year’s DBIR reveals a landscape shaped by not just individual threats, but by entire economies of compromise. The post Inside the Verizon 2025 DBIR: Five Trends That

React to this headline:

Loading spinner

Inside the Verizon 2025 DBIR: Five Trends That Signal a Shift in the Cyber Threat Economy Read More »

Ethical Zero Day Marketplace Desired Effect Emerges From Stealth

Ethical Zero Day Marketplace Desired Effect Emerges From Stealth 2025-04-23 at 17:48 By Kevin Townsend Desired Effect provides an ethical vulnerability exchange marketplace to help defenders get ahead of attackers. The post Ethical Zero Day Marketplace Desired Effect Emerges From Stealth appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Ethical Zero Day Marketplace Desired Effect Emerges From Stealth Read More »

Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation

Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation 2025-04-21 at 16:01 By Kevin Townsend With 51% of internet traffic now bot-driven and a growing share of it malicious, organizations must prepare for an era of more evasive, AI-assisted automation. The post Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation appeared first

React to this headline:

Loading spinner

Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation Read More »

Why ‘One Community’ Resonates in Cybersecurity

Why ‘One Community’ Resonates in Cybersecurity 2025-04-17 at 15:07 By Marc Solomon Our collective voices and one community will provide the intelligence we need to safeguard our businesses in today’s modern digital environment. The post Why ‘One Community’ Resonates in Cybersecurity appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Why ‘One Community’ Resonates in Cybersecurity Read More »

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools 2025-04-09 at 20:50 By Ryan Naraine Google plans to unleash automated AI agents into overtaxed SOCs to reduce the manual workload for cybersecurity investigators. The post Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools Read More »

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse 2025-04-08 at 16:29 By Serhii Melnyk and Nikita Kazymirskyi In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta, a prolific ransomware group. This article is an excerpt from SpiderLabs Blog View Original Source React to this

React to this headline:

Loading spinner

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse Read More »

Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows

Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows 2025-04-07 at 18:06 By Ryan Naraine Experimental Sec-Gemini v1 touts a combination of Google’s Gemini LLM capabilities with real-time security data and tooling from Mandiant. The post Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows Read More »

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity 2025-03-28 at 15:09 By Uncover Critical Cybersecurity Gaps: Learn how Trustwave SpiderLabs’ Red Team identified vulnerabilities in a US-based healthcare system. Real-World Red Team Insights: Explore key findings from simulated attacks that reveal how adversaries could compromise sensitive data. Healthcare Cybersecurity Trends: Access exclusive

React to this headline:

Loading spinner

The Crucial Role Trustwave Red Team Exercises Play in Enhancing Cybersecurity Read More »

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups 2025-03-27 at 15:08 By Top Targets: Discover which healthcare segments ransomware attackers target the most. Threat Actors Exposed: Learn about the cybercriminal groups behind the biggest healthcare attacks. Real-World Impact: See how ransomware disrupts patient care, emergency services, and medical research. Ransomware remains the primary threat the

React to this headline:

Loading spinner

Ransomware in Healthcare: Unmasking the Most Targeted Segments and Threat Groups Read More »

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need for

React to this headline:

Loading spinner

2025 Healthcare Cybersecurity Threats: Insights from the Trustwave Risk Radar Report Read More »

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures 2025-03-26 at 15:02 By Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare organizations, from ransomware to third-party threats. Key Findings from the 2025 Trustwave Risk Radar Report – Explore critical insights on healthcare cybersecurity, attack trends, and the growing need

React to this headline:

Loading spinner

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures Read More »

Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs

Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs 2025-03-25 at 13:54 By Kevin Townsend Threats themselves change very little, but the tactics used are continually revised to maximize the criminals’ return on investment and effort. The post Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs appeared first on SecurityWeek.

React to this headline:

Loading spinner

Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs Read More »

Unlock Critical Healthcare Cyber Insights — Pre-Register Now!

Unlock Critical Healthcare Cyber Insights — Pre-Register Now! 2025-03-19 at 22:22 By Trustwave is set to unveil the 2025 Trustwave Risk Radar Report: Healthcare Sector – A New Era of Cybersecurity Challenges. The report will be issued on March 26, but if you pre-register today you will be among the first to receive this comprehensive research and

React to this headline:

Loading spinner

Unlock Critical Healthcare Cyber Insights — Pre-Register Now! Read More »

March Madness Requires Vigilance on Both an Individual and Corporate Level

March Madness Requires Vigilance on Both an Individual and Corporate Level 2025-03-19 at 17:32 By Marc Solomon Defending high profile sporting events from adversarial attacks requires a mix of experienced capabilities and a solid threat intelligence program. The post March Madness Requires Vigilance on Both an Individual and Corporate Level appeared first on SecurityWeek. This

React to this headline:

Loading spinner

March Madness Requires Vigilance on Both an Individual and Corporate Level Read More »

New Cloudflare Service Provides Real-Time Threat Intelligence

New Cloudflare Service Provides Real-Time Threat Intelligence 2025-03-18 at 15:03 By Eduard Kovacs Cloudflare launches Cloudforce Threat Events Feed, a service designed to provide security teams with real-time threat intelligence. The post New Cloudflare Service Provides Real-Time Threat Intelligence appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

New Cloudflare Service Provides Real-Time Threat Intelligence Read More »

IntelMQ: Open-source tool for collecting and processing security feeds

IntelMQ: Open-source tool for collecting and processing security feeds 2025-03-17 at 07:02 By Mirko Zorz IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the collection and processing of security feeds using a message queuing protocol. “Originally designed for CSIRTs and later adopted by SOCs,

React to this headline:

Loading spinner

IntelMQ: Open-source tool for collecting and processing security feeds Read More »

Are Threat Groups Belsen and ZeroSevenGroup Related?

Are Threat Groups Belsen and ZeroSevenGroup Related? 2025-03-12 at 04:15 By Kevin Townsend Kela admits that its evidence for a connection between Belsen and ZeroSevenGroup is largely circumstantial, primarily based on styles. The post Are Threat Groups Belsen and ZeroSevenGroup Related? appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Are Threat Groups Belsen and ZeroSevenGroup Related? Read More »

Trustwave SpiderLabs Insights: Cyberattack Methods Targeting Manufacturing

Trustwave SpiderLabs Insights: Cyberattack Methods Targeting Manufacturing 2025-02-28 at 16:12 By When it comes to choosing a manufacturer to target for attack, threat groups have a healthy list of tools from which to choose. All of which are made more powerful due to this industry’s complex cybersecurity posture, driven by the increasing integration of IT/OT

React to this headline:

Loading spinner

Trustwave SpiderLabs Insights: Cyberattack Methods Targeting Manufacturing Read More »

Bridging the Gap: Why IT and OT Convergence is Reshaping Manufacturing

Bridging the Gap: Why IT and OT Convergence is Reshaping Manufacturing 2025-02-27 at 16:02 By The line between Information Technology (IT) and Operational Technology (OT) has been blurring for years and what once were two distinct realms — IT managing data and networks, and OT controlling physical processes on the production floor — are now

React to this headline:

Loading spinner

Bridging the Gap: Why IT and OT Convergence is Reshaping Manufacturing Read More »

Scroll to Top