Shedding Light on Election Deepfakes

September 25, 2024 | Pauline Bolaños

Contrary to popular belief, deepfakes — AI-crafted audio files, images, or ...

HTML Smuggling: How Blob URLs are Abused to Deliver Phishing Content

September 24, 2024 | Mike Casayuran

HTML smuggling techniques have been around for quite some time. A previous ...

Why Do Criminals Love Phishing-as-a-Service Platforms?

September 23, 2024 | Rodel Mendrez

Phishing-as-a-Service (PaaS) platforms have become the go-to tool for ...

Spam With A Political Twist: Fraudsters Are Exploiting The Election Season

September 17, 2024 | Katrina Udquin

The US election is less than 70 days away and threat actors are busy crafting ...

Bypassing EDR through Retrosigned Drivers and System Time Manipulation

September 13, 2024 | Zachary Reichert and Partha Alwar

The Retrosigned Driver EDR Bypass is a novel modification of a technique ...

Distributed Denial of Truth (DDoT): The Mechanics of Influence Operations and The Weaponization of Social Media

September 13, 2024 | Jose Tozo

With the US election on the horizon, it’s a good time to explore the concept of ...

Trustwave SpiderLabs Research: 20% of Ransomware Attacks in Financial Services Target Banking Institutions

September 10, 2024

The 2024 Trustwave Risk Radar Report: Financial Services Sector underscores the ...

Exploring an Experimental Windows Kernel Rootkit in Rust

September 09, 2024

Around two years ago, memN0ps took the initiative to create one of the first ...

DNSForge – Responding with Force

September 09, 2024 | Apurva Goenka

Introducing DNSForge, a novel attacker tactic for responding to name resolution ...

Hypervisor Development in Rust for Security Researchers (Part 1)

September 06, 2024

In the ever-evolving field of information security, curiosity and continuous ...

Your Money or Your Data: Ransomware Readiness Planning

September 02, 2024 | David Broggy

Today’s blog installment brings us to the end of our 30-week journey that ...

Exposed and Encrypted: Inside a Mallox Ransomware Attack

August 27, 2024 | Bernard Bautista

Recently, a client enlisted the support of Trustwave to investigate an ...

The Willy Wonka World of Application Security Defenses

August 26, 2024 | David Broggy

One doesn’t have to be a magician to understand how to track the hundreds, if ...

Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules

August 19, 2024 | Zachary Reichert, Daniel Stein, Joshua Pivirotto

Stroz Friedberg identified a stealthy malware, dubbed “sedexp,” utilizing Linux ...

The Bug Stops Here: Using DevSecOps Workflows for Pest-Free Applications

August 19, 2024 | David Broggy

Developers and cybersecurity have an interesting relationship. Developers have ...

Deep Dive and Simulation of a MariaDB RCE Attack: CVE-2021-27928

August 16, 2024 | Karl Biron

In early 2021, a new vulnerability, identified as CVE-2021-27928, was ...

Command Injection and Path Traversal in StoneFly Storage Concentrator

August 16, 2024 | David Glenn Baylon

CVE-2024-30213, CVE-2024-31947: Blind Operating System Command Injection and ...

Trustwave Rapid Response: Mitigate Windows TCP/IP RCE Vulnerability (CVE-2024-38063)

August 15, 2024

Microsoft has disclosed a critical (CVSS 9.8) TCP/IP remote code execution ...

The Art of Deception: Turning the Tables on Attackers with Active Defenses

August 12, 2024 | David Broggy

Once an attacker enters your network, one of their first actions will be to try ...

Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You

August 06, 2024 | Fernando Dominguez

Executive Summary LevelBlue Labs has identified a new evolution in the toolset ...

Sentinels of Ex Machina: Defending AI Architectures

August 05, 2024 | David Broggy

The introduction, adoption, and quick evolution of generative AI has raised ...

SYS01 Infostealer and Rilide Malware Likely Developed by the Same Threat Actor

July 31, 2024

Drawing on extensive proprietary research, Trustwave SpiderLabs believes the ...

Multiple Cross-Site Scripting (XSS) Vulnerabilities in REDCap (CVE-2024-37394, CVE-2024-37395, and CVE-2024-37396)

July 30, 2024 | Hamza Hussain

Trustwave SpiderLabs uncovered multiple stored cross-site scripting (XSS) ...

Adopt an AI Approach with Confidence, for CISOs and CIOs

July 29, 2024 | Scott Swanson and Kris Kimmerle

This article provides an AI adoption approach for technology leaders chartered ...

Knowing your Enemy: Situational Awareness in Cyber Defenses

July 29, 2024 | David Broggy

Most homeowners know that a lock is a good idea as a basic defense against ...

Cloudy with a Chance of Hackers: Protecting Critical Cloud Workloads

July 22, 2024 | David Broggy

If you've been following along with David's posts, you'll have noticed a ...

Responding to the CrowdStrike Outage: Implications for Cyber and Technology Professionals

July 19, 2024

This client alert provides an overview of the current global IT outage that is ...

Trustwave Rapid Response: CrowdStrike Falcon Outage Update

July 19, 2024

Trustwave is proactively assessing and monitoring our clients who may have been ...