Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberfraud on the rise: technology as a shield for businesses

In a world of constant threats, real-time detection and prevention make all the difference. Imagine starting your day with the news that millions of your bank’s customers have fallen victim to a cyberattack. This became a reality last year when cybercriminals claimed to have gained access to Santander Bank’s data, demanding millions of dollars in ransom. While the bank did not confirm the exact details, it admitted to a data breach.

The Story Behind Exabeam Nova: Shining a Light on Cybersecurity Threats

In the high-stakes world of cybersecurity, every detail matters — including the name of the technology designed to uplevel SOC teams to protect their organizations from ever-growing, ever-evolving threats. Naming isn’t just about branding; it’s about capturing purpose, function, and vision.

AI in Action: Transforming Cyber Defense Strategies with Agentic MDR

While various AI and machine learning automated workflows offer a great deal of insights into complex prediction and computation problems, recent advances in generative AI provide excellent summarization and content generation capabilities for a broad range of use cases. This means that search results are more comprehensive and accurate, often tailored to end-user needs. However, one remaining opportunity is to get the end-to-end job done with accuracy, speed and more importantly, agility.

Insider Threats: How Businesses Can Detect and Prevent Internal Cyber Risks

Organizations today face an array of cyber-security challenges. While external threat actors, such as nation-states and cyber-criminals, account for a significant portion of these attacks, a critical and often overlooked vulnerability exists within business walls: the insider threat. An insider threat refers to a cyber-threat originating from within the organization. This internal risk factor, though less sensationalized, presents a significant risk to an organization’s security posture.

Cybersecurity Consulting and Ransomware Updates, March

This blog post provides a high-level overview of the latest cybersecurity threats for the month of March, to inform businesses and tech users about key risks. For detailed technical insights, refer to the accompanying PowerPoint briefing available here. Cybersecurity threats escalated in March, with significant attacks, breaches, and vulnerabilities impacting organizations worldwide. From ransomware surges to exploited software flaws, businesses faced a challenging landscape.

Supply Chain Attacks: What You Should Know

Supply-chain attacks may not grab the headlines in the same way as ransomware or data breaches, but these horrific, sneaky cyberattacks are just as dangerous for your business. Here are five things you need to know about supply chain attacks, including what they are, why they happen, and how to prevent them.

Babuk2 Bjorka: The Evolution of Ransomware for 'Data Commoditization'

An investigation that started with a tip from one of our threat intel sources about the revival of the Babuk (figure 1) threat group has led Trustwave SpiderLabs to uncover what appears to be a paradigm shift in the ransomware landscape. Figure 1. SpiderLabs telemetry (January 2025 events). Figure 1A. February to March events. Figure 1B. SpiderLabs telemetry (March 2025 events).

Top 10 Cybersecurity Threats WAFs Prevent

A Web Application Firewall (WAF) is your first line of defense against internet traffic that can be both legitimate and malicious. It helps protect your web applications, websites, and servers from various cyber-attacks by filtering out harmful traffic. WAF (WAAP) is essential for web security as it quickly identifies and addresses vulnerabilities in applications and servers.

4-Time Technology Excellence Leader in the SPARK Matrix

The cybersecurity market continues to become more crowded, making it increasingly difficult for organizations to separate hype from reality and find security solutions that truly meet their needs. Messages sound the same. Demos look impressive, but how much is vision? And when the rubber meets the road, it’s hard to know what to expect in terms of the deployment, user experience, and impact to the business.