Threat Intelligence

How the Shadowserver Foundation helps network defenders with free intelligence feeds

How the Shadowserver Foundation helps network defenders with free intelligence feeds 2024-12-05 at 07:01 By Mirko Zorz In this Help Net Security interview, Piotr Kijewski, CEO of The Shadowserver Foundation, discusses the organization’s mission to enhance internet security by exposing vulnerabilities, malicious activity, and emerging threats. Kijewski explains the foundation’s automated efforts to track and […]

React to this headline:

Loading spinner

How the Shadowserver Foundation helps network defenders with free intelligence feeds Read More »

The Role of AI in Cybersecurity: Opportunities, Challenges, and Future Threats

The Role of AI in Cybersecurity: Opportunities, Challenges, and Future Threats 2024-12-04 at 16:04 By Ziv Mador As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Over the next several weeks their thoughts

React to this headline:

Loading spinner

The Role of AI in Cybersecurity: Opportunities, Challenges, and Future Threats Read More »

Best practices for staying cyber secure during the holidays

Best practices for staying cyber secure during the holidays 2024-12-03 at 07:07 By Help Net Security In this Help Net Security video, Sean Tufts, managing partner for critical infrastructure and operational technology at Optiv, discusses best practices for keeping businesses secure amidst a barrage of threats during the holiday season. Pause large changes in your

React to this headline:

Loading spinner

Best practices for staying cyber secure during the holidays Read More »

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching 2024-11-19 at 20:54 By There is no doubt about the value of conducting Managed Vulnerability Scanning. Trustwave has posted multiple blogs on the topic, (just check here, here, and here) for a look at how Trustwave approaches this very important cybersecurity procedure. This article is an excerpt

React to this headline:

Loading spinner

Managed Vulnerability Scanning: Key Findings and the Importance of Regular Patching Read More »

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers 2024-11-07 at 16:03 By This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. This article is an excerpt from Trustwave Blog View Original Source React

React to this headline:

Loading spinner

Analyzing Play and LockBit: The Top Ransomware Threats Facing Retailers Read More »

E-Commerce Security Woes: Millions of Stolen User Sessions Found for Sale

E-Commerce Security Woes: Millions of Stolen User Sessions Found for Sale 2024-10-30 at 15:05 By The booming e-commerce industry, with its projected $5 trillion in sales by 2025, has become a prime target for cybercriminals, a fact highlighted in the new Trustwave SpiderLabs report, Retail Sector Deep Dive: Rise of E-Commerce Threats. This article is an excerpt from

React to this headline:

Loading spinner

E-Commerce Security Woes: Millions of Stolen User Sessions Found for Sale Read More »

Trustwave SpiderLabs 2024 Trustwave Risk Radar Report: Defining the Cyber Assault on the Retail Sector

Trustwave SpiderLabs 2024 Trustwave Risk Radar Report: Defining the Cyber Assault on the Retail Sector 2024-10-29 at 15:17 By The holiday shopping season is almost here, and according to the 2024 Trustwave Risk Radar Report: Retail Sector, threat actors have honed their skills and are prepared to use ransomware and phishing attacks that leverage well-known online brands

React to this headline:

Loading spinner

Trustwave SpiderLabs 2024 Trustwave Risk Radar Report: Defining the Cyber Assault on the Retail Sector Read More »

2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector

2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector 2024-10-29 at 15:17 By As the holiday shopping season approaches, the 2024 Trustwave Risk Radar Report: Retail Sector reveals that cybercriminals have sharpened their tactics, utilizing ransomware and phishing attacks that exploit well-known online brands to target retailers and consumers directly. This article is an

React to this headline:

Loading spinner

2024 Trustwave Risk Radar Report: Cyber Threats to the Retail Sector Read More »

Threat Actors Zero in on Retailers as the Holiday Shopping Season Approaches

Threat Actors Zero in on Retailers as the Holiday Shopping Season Approaches 2024-10-22 at 17:18 By Trustwave SpiderLabs on October 29 will launch its second deeply researched look into the threats facing the retail sector. This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Threat Actors Zero in on Retailers as the Holiday Shopping Season Approaches Read More »

Ransomware Readiness: 10 Steps Every Organization Must Take

Ransomware Readiness: 10 Steps Every Organization Must Take 2024-10-18 at 18:31 By At the end of every year, the Trustwave content team asks its in-house experts what cybersecurity topics they predict will be top of mind in the coming 12 months, and inevitably the top answer is more ransomware. This article is an excerpt from

React to this headline:

Loading spinner

Ransomware Readiness: 10 Steps Every Organization Must Take Read More »

Analyzing Latrodectus: The New Face of Malware Loaders

Analyzing Latrodectus: The New Face of Malware Loaders 2024-10-08 at 16:01 By This report is the latest in a series that will delve into the deep research theTrustwave SpiderLabs Threat Intelligence team conducts daily on the major threat actor groups currently operating globally.  This article is an excerpt from Trustwave Blog View Original Source React

React to this headline:

Loading spinner

Analyzing Latrodectus: The New Face of Malware Loaders Read More »

Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader 2024-10-08 at 16:01 By Cris Tomboc and King Orande Trustwave’s Threat Intelligence team has discovered a new malware dubbed Pronsis Loader, with its earliest known variant dating back to November 2023. This article is an excerpt from SpiderLabs Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader Read More »

Cybersecurity Awareness Month: Adding Seasonal Spice to Managed Detection and Response (MDR)

Cybersecurity Awareness Month: Adding Seasonal Spice to Managed Detection and Response (MDR) 2024-10-07 at 16:03 By It’s Cybersecurity Awareness Month and you know what that means. Pumpkin spice versions of Trustwave Managed Detection and Response (MDR) solutions are now available! This article is an excerpt from Trustwave Blog View Original Source React to this headline:

React to this headline:

Loading spinner

Cybersecurity Awareness Month: Adding Seasonal Spice to Managed Detection and Response (MDR) Read More »

What We Know So Far About Zero-Day CUPS Vulnerabilities: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177

What We Know So Far About Zero-Day CUPS Vulnerabilities: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177 2024-09-30 at 22:01 By On September 26, 2024, security researcher Simone Margaritelli disclosed the details of four OpenPrinting Common UNIX Printing System (CUPS) vulnerabilities, that, when chained together, can allow malicious actors to launch remote code execution (RCE) attacks on vulnerable systems. This article is

React to this headline:

Loading spinner

What We Know So Far About Zero-Day CUPS Vulnerabilities: CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177 Read More »

2024 Election Threats: Misinformation, Deepfakes, and Cybersecurity

2024 Election Threats: Misinformation, Deepfakes, and Cybersecurity 2024-09-27 at 16:01 By Karl Sigler As the intensity of a critical election year builds, the greatest threat isn’t necessarily the security of ballot machines. Instead, it lies in misinformation, amplified by social media, biased algorithms, and the spread of fake news. During the 2020 U.S. presidential election,

React to this headline:

Loading spinner

2024 Election Threats: Misinformation, Deepfakes, and Cybersecurity Read More »

Developing an effective cyberwarfare response plan

Developing an effective cyberwarfare response plan 2024-09-27 at 07:01 By Mirko Zorz In this Help Net Security interview, Nadir Izrael, CTO at Armis, discusses how AI has transformed cyberwarfare by amplifying attacks’ scale and sophistication. Izrael emphasizes the need for AI-powered defenses and proactive cybersecurity strategies to combat these evolving threats. How has adopting AI

React to this headline:

Loading spinner

Developing an effective cyberwarfare response plan Read More »

FINRA Warns of Rising Risks as Third-Party Cyberattacks Threaten Financial Services

FINRA Warns of Rising Risks as Third-Party Cyberattacks Threaten Financial Services 2024-09-26 at 01:03 By Earlier this month, the Financial Industry Regulatory Authority (FINRA) posted a cybersecurity advisory highlighting the recent cybersecurity risks of third parties impacting its members and financial services organizations. The recently released Trustwave SpiderLabs 2024 Trustwave Risk Radar Report: Financial Services

React to this headline:

Loading spinner

FINRA Warns of Rising Risks as Third-Party Cyberattacks Threaten Financial Services Read More »

Shedding Light on Election Deepfakes

Shedding Light on Election Deepfakes 2024-09-25 at 16:01 By Pauline Bolaños Contrary to popular belief, deepfakes — AI-crafted audio files, images, or videos that depict events and statements that never occurred; a portmanteau of “deep learning” and “fake” — are not all intrinsically malicious.  This article is an excerpt from SpiderLabs Blog View Original Source React to

React to this headline:

Loading spinner

Shedding Light on Election Deepfakes Read More »

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content 2024-09-24 at 16:01 By Mike Casayuran HTML smuggling techniques have been around for quite some time. A previous Trustwave SpiderLabs’ blog discussed its use in distributing malware by storing binaries in immutable blob data within JavaScript code that gets decoded on the client-side browser, eventually delivering

React to this headline:

Loading spinner

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content Read More »

Scroll to Top