Behind the scenes: JaskaGO's coordinated strike on macOS and Windows

December 18, 2023 | Ofer Caspi

Executive summary In recent developments, a sophisticated malware stealer ...

Honeypot Recon: MySQL Malware Infection via User-Defined Functions (UDF)

December 14, 2023 | Radek Zdonczyk

In the vast world of cybersecurity, as technologies evolve, so do the methods ...

Trustwave SpiderLabs Report: LockBit 3.0 Ransomware Vs. the Manufacturing Sector

December 06, 2023

As the manufacturing sector continues its digital transformation, Operational ...

Overview of the Cyberwarfare used in Israel – Hamas War

December 05, 2023 | SpiderLabs Researcher

On October 7, 2023, the Palestinian organization Hamas launched the biggest ...

Restricted Admin Mode – Circumventing MFA On RDP Logons

November 15, 2023 | Apurva Goenka

This blog post demonstrates the use of Restricted Admin mode to circumvent MFA ...

The 2023 Retail Services Sector Threat Landscape: A Trustwave Threat Intelligence Briefing

November 15, 2023

The annual holiday shopping season is poised for a surge in spending, a fact ...

Detecting “Effluence”, An Unauthenticated Confluence Web Shell

November 09, 2023 | Zachary Reichert

Discovering Effluence, a unique web shell accessible on every page of an ...

Pwning Electroencephalogram (EEG) Medical Devices by Default

November 07, 2023 | John Jackson

Overall Analysis of Vulnerability Identification – Default Credentials Leading ...

Hidden Data Exfiltration Using Time, Literally

October 17, 2023 | Tom Neaves

I was looking at my watch last week and my attention was moved towards the ...

A SIMple Attack: A Look into Recent SIM Swap Attack Trends

October 14, 2023 | Natasha Vij and Victoria Nyktas

Stroz Friedberg has observed an uptick in SIM swapping across multiple ...

Flash Loan Attacks: A Case Study

October 13, 2023 | Eric Rafaloff

This blog post explains how flash loans work, their history, and their role in ...

HTTP/2 Rapid Reset

October 13, 2023 | Medz Barao

A recent vulnerability tracked as Rapid Reset (CVE-2023-44487) in the HTTP/2 ...

Unveiling the CAPTCHA Escape: The Dance of CAPTCHA Evasion Using TOR

October 13, 2023 | Medz Barao

In this era, threat actors have proven to be tireless in their pursuit of ...

2023 Financial Services Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies

October 11, 2023

Cyberattacks striking the financial services industry are more prevalent, ...

Patch Tuesday, October 2023

October 10, 2023 | Jeannette Dickens Hale

Halloween is arriving and with it, Trustwave’s return to Patch Tuesday reports.

Amazon (AWS) S3 Bucket Take Over

September 27, 2023 | Medz Barao

Let’s try something a bit different and take a look at some of Trustwave ...

Multiple Command and Control (C2) Frameworks During Red Team Engagements

September 21, 2023 | Philip Pieterse

When conducting Red Team engagements, more than one Command and Control (C2) ...

Financially Motivated Criminal Group Targets Telecom, Technology & Manufacturing

September 20, 2023 | Stroz Friedberg DFIR

This client advisory provides an overview of techniques and tactics attributed ...

Stealthy VBA Macro Embedded in PDF-like Header Helps Evade Detection

September 20, 2023 | Rodel Mendrez

In the ever-evolving landscape of malware threats, threat actors are ...

To OSINT and Beyond!

September 13, 2023 | Medz Barao

Open-Source Intelligence (OSINT) can be valuable for an organization and ...

The Evolution of Phishing Campaigns

September 11, 2023 | Rachel Kang

In 2022, phishing was responsible for more than half of the incidents ...

LevelBlue SpiderLabs Releases Actionable Cybersecurity Intelligence for the Hospitality Industry

September 07, 2023

The LevelBlue SpiderLabs team conducted a multi-month investigation into the ...

A Bucket of Phish: Attackers Shift Tactics with Cloudflare R2 Public Buckets

September 06, 2023 | Karla Agregado

In our previous blog, we found a lot of phishing and scam URLs abusing ...

Threat-Loaded: Malicious PDFs Never Go Out of Style

August 31, 2023 | Bernard Bautista

Introduction In the realm of cybersecurity, danger hides where we least expect ...

The Evolution of Persistent Threats: From Chernobyl to BlackLotus

August 30, 2023 | Jose Tozo

In this blog post, we will explore how the computer security landscape has ...

Think Before You Scan: The Rise of QR Codes in Phishing

August 29, 2023 | Mike Casayuran

QR Codes, the square images that contain coded information that can be scanned ...

Behind the Invite: The Rise of Google Group Fake Order Fraud Emails

August 25, 2023 | Maria Katrina Udquin and John Kevin Adriano

As the world shifted into remote work and distant learning during the pandemic ...

BEC Trends: Payroll Diversion Dominates and Sneaky Multi-Persona Attacks Emerge

August 24, 2023 | Maria Katrina Udquin

Business Email Compromise (BEC) remains a lucrative threat vector for ...