Shedding Light on Election Deepfakes
September 25, 2024 | Pauline Bolaños
Contrary to popular belief, deepfakes — AI-crafted audio files, images, or ...
HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content
September 24, 2024 | Mike Casayuran
HTML smuggling techniques have been around for quite some time. A previous ...
Why Do Criminals Love Phishing-as-a-Service Platforms?
September 23, 2024 | Rodel Mendrez
Phishing-as-a-Service (PaaS) platforms have become the go-to tool for ...
Spam With A Political Twist: Fraudsters Are Exploiting The Election Season
September 17, 2024 | Katrina Udquin
The US election is less than 70 days away and threat actors are busy crafting ...
Bypassing EDR through Retrosigned Drivers and System Time Manipulation
September 13, 2024 | Zachary Reichert and Partha Alwar
The Retrosigned Driver EDR Bypass is a novel modification of a technique ...
Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media
September 13, 2024 | Jose Tozo
With the US election on the horizon, it’s a good time to explore the concept of ...
Trustwave SpiderLabs Research: 20% of Ransomware Attacks in Financial Services Target Banking Institutions
September 10, 2024
The 2024 Trustwave Risk Radar Report: Financial Services Sector underscores the ...
Exploring an Experimental Windows Kernel Rootkit in Rust
September 09, 2024
Around two years ago, memN0ps took the initiative to create one of the first ...
DNSForge – Responding with Force
September 09, 2024 | Apurva Goenka
Introducing DNSForge, a novel attacker tactic for responding to name resolution ...
Hypervisor Development in Rust for Security Researchers (Part 1)
September 06, 2024
In the ever-evolving field of information security, curiosity and continuous ...
Your Money or Your Data: Ransomware Readiness Planning
September 02, 2024 | David Broggy
Today’s blog installment brings us to the end of our 30-week journey that ...
Exposed and Encrypted: Inside a Mallox Ransomware Attack
August 27, 2024 | Bernard Bautista
Recently, a client enlisted the support of Trustwave to investigate an ...
The Willy Wonka World of Application Security Defenses
August 26, 2024 | David Broggy
One doesn’t have to be a magician to understand how to track the hundreds, if ...
Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules
August 19, 2024 | Zachary Reichert, Daniel Stein, Joshua Pivirotto
Stroz Friedberg identified a stealthy malware, dubbed “sedexp,” utilizing Linux ...
The Bug Stops Here: Using DevSecOps Workflows for Pest-Free Applications
August 19, 2024 | David Broggy
Developers and cybersecurity have an interesting relationship. Developers have ...
Deep Dive and Simulation of a MariaDB RCE Attack: CVE-2021-27928
August 16, 2024 | Karl Biron
In early 2021, a new vulnerability, identified as CVE-2021-27928, was ...
Command Injection and Path Traversal in StoneFly Storage Concentrator
August 16, 2024 | David Glenn Baylon
CVE-2024-30213, CVE-2024-31947: Blind Operating System Command Injection and ...
Trustwave Rapid Response: Mitigate Windows TCP/IP RCE Vulnerability (CVE-2024-38063)
August 15, 2024
Microsoft has disclosed a critical (CVSS 9.8) TCP/IP remote code execution ...
The Art of Deception: Turning the Tables on Attackers with Active Defenses
August 12, 2024 | David Broggy
Once an attacker enters your network, one of their first actions will be to try ...
Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You
August 06, 2024 | Fernando Dominguez
Executive Summary LevelBlue Labs has identified a new evolution in the toolset ...
Sentinels of Ex Machina: Defending AI Architectures
August 05, 2024 | David Broggy
The introduction, adoption, and quick evolution of generative AI has raised ...
SYS01 Infostealer and Rilide Malware Likely Developed by the Same Threat Actor
July 31, 2024
Drawing on extensive proprietary research, Trustwave SpiderLabs believes the ...
Multiple Cross-Site Scripting (XSS) Vulnerabilities in REDCap (CVE-2024-37394, CVE-2024-37395, and CVE-2024-37396)
July 30, 2024 | Hamza Hussain
Trustwave SpiderLabs uncovered multiple stored cross-site scripting (XSS) ...
Adopt an AI Approach with Confidence, for CISOs and CIOs
July 29, 2024 | Scott Swanson and Kris Kimmerle
This article provides an AI adoption approach for technology leaders chartered ...
Knowing your Enemy: Situational Awareness in Cyber Defenses
July 29, 2024 | David Broggy
Most homeowners know that a lock is a good idea as a basic defense against ...
Cloudy with a Chance of Hackers: Protecting Critical Cloud Workloads
July 22, 2024 | David Broggy
If you've been following along with David's posts, you'll have noticed a ...
Responding to the CrowdStrike Outage: Implications for Cyber and Technology Professionals
July 19, 2024
This client alert provides an overview of the current global IT outage that is ...
Trustwave Rapid Response: CrowdStrike Falcon Outage Update
July 19, 2024
Trustwave is proactively assessing and monitoring our clients who may have been ...