PhaaS the Secrets: The Hidden Ties Between Tycoon2FA and Dadsec's Operations

The Blind Spots of Multi-Agent Systems: Why AI Collaboration Needs Caution

Multi-agent systems (MAS) are reshaping industries from IT services to innovative city governance ...

Read More

Storm-0558 and the Dangers of Cross-Tenant Token Forgery

Modern cloud ecosystems often place a single identity provider in charge of handling logins and ...

Read More

Hospitality Under Attack: New Trustwave Report Highlights Cybersecurity Challenges in 2025

As the summer travel season approaches, travelers worldwide are busy booking their holidays, ...

Read More

Guarding Against Dependency Attacks: Essential Strategies for Modern Application Development

Dependency management is one of the biggest challenges in modern software development.

Read More

Lights Out and Stalled Factories: Using M.A.T.R.I.X to Learn About Modbus Vulnerabilities

Let’s explore the critical role of Modbus in energy and manufacturing systems, then demonstrate ...

Read More

A Deep-Rooted Infestation: How the ILOVEYOU Bug Continues its Legacy in Modern Worms

A quarter century ago, a former computer science student from the Philippines accidentally ...

Read More

Yet Another NodeJS Backdoor (YaNB): A Modern Challenge

During an Advanced Continual Threat Hunt (ACTH) investigation conducted in early March 2025, ...

Read More

Agent In the Middle – Abusing Agent Cards in the Agent-2-Agent (A2A) Protocol To ‘Win’ All the Tasks

I think you’ll agree with me that growth in the AI landscape is pretty full-on at the moment. I go ...

Read More

Proton66 Part 2: Compromised WordPress Pages and Malware Campaigns

Earlier this year SpiderLabs observed an increase in mass scanning, credential brute forcing, and ...

Read More

Proton66 Part 1: Mass Scanning and Exploit Campaigns

Trustwave SpiderLabs continuously tracks a range of malicious activities originating from Proton66 ...

Read More

Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks

Ever thought an image file could be part of a cyber threat? The Trustwave SpiderLabs Email Security ...

Read More

Tycoon2FA New Evasion Technique for 2025

The Tycoon 2FA phishing kit has adopted several new evasion techniques aimed at slipping past ...

Read More

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse

In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the ...

Read More

Babuk2 Bjorka: The Evolution of Ransomware for ‘Data Commoditization’

An investigation that started with a tip from one of our threat intel sources about the revival of ...

Read More

2025 Trustwave Risk Radar Report: Healthcare Sector: Key Risks and Defensive Measures

Rising Cyber Threats in Healthcare – Discover the latest cybersecurity risks targeting healthcare ...

Read More

Trustwave SpiderLabs Threat Review: Alleged Oracle Compromise

On March 20, a relatively unknown user on Breach Forums posted the allegation that Oracle had ...

Read More

Why Principle of Least Privilege Matters More Than Ever in a World of Backdoored Large Language Models (LLMs)

The concept of “principle of least privilege” has been around for a long time. In fact, it is older ...

Read More

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 2

In Part 1 of Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster, we ...

Read More

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster – Part 1

Picture this: an always-awake, never-tired, high-speed librarian that instantly finds the exact ...

Read More

Resurgence of a Fake Captcha Malware Campaign

During an Advanced Continual Threat Hunt (ACTH) investigation in early February 2025, Trustwave ...

Read More

The Russia-Ukraine Cyber War Part 4: Development in Group Attributions for Russian State Actors

This is the final installment of Trustwave SpiderLabs Russia-Ukraine digital battlefield series, ...

Read More

A Deep Dive into Strela Stealer and how it Targets European Countries

Infostealers have dominated the malware landscape due to the ease of threat operations maintenance, ...

Read More

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure

This post is the third part of our blog series that tackles the Russia-Ukraine war in the digital ...

Read More

2025 Trustwave Risk Radar Report: Top Cyber Threats Targeting the Manufacturing Sector

2025 Trustwave Risk Radar Report Unveils Top Cyber Threats to Manufacturing: Discover the key ...

Read More

The Russia-Ukraine Cyber War Part 2: Attacks Against Government Entities, Defense Sector, and Human Targets

In the first part of Trustwave SpiderLabs’ Russia-Ukraine war blog series, we gave a brief look at ...

Read More

The Russia-Ukraine Cyber War Part 1: Three Years of Cyber Warfare

As the third anniversary of the start of the Russia-Ukraine war approaches, Trustwave SpiderLabs ...

Read More

The Rise of Email Marketing Platforms for Business Email Compromise Attacks

In a statistical report published in September 2024 by the Federal Bureau of Investigation (FBI), ...

Read More