Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trustwave

The Database Slayer: Deep Dive and Simulation of the Xbash Malware

In the world of malware, common ransomware schemes aim to take the data within databases (considered the "gold" in the vault of any organization) and hold them hostage, promising data recovery upon ransom payment. Typically, most of these schemes follow an expected script: encrypting files, requesting payment, and then delivering a decryption key. This model, while damaging, generally allows victims to recover if they pay the ransom.

The State of Magecart: A Persistent Threat to E-Commerce Security

Trustwave SpiderLabs first blogged about Magecart back in 2019; fast forward five years and it is still here going strong. During the pre-holiday season, cybercriminals ramped up their efforts to target e-commerce websites, aiming to steal cardholder and personal information. These attacks, collectively known as Magecart, have been active since 2015, named after the Magento e-commerce platform with "cart" referencing shopping carts — their initial primary targets.

Trustwave's 2025 Cybersecurity Predictions: The Era of End-to-End AI Cyberattacks is Here

As 2024 has wrapped up, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. I'm willing to go on a limb this year and say there is an excellent chance we will see the first fully autonomous and end-to-end malware, ransomware, or other cyberattack campaigns take place.

HHS Proposes Critical HIPAA Security Rule Updates to Combat Rising Cybersecurity Threats in Healthcare

The Health and Human Services Office of Civil Rights (OCR) has launched an effort to improve cybersecurity measures for a wide variety of healthcare organizations. The aim is to counter the significant increase in the number of breaches and cyberattacks impacting healthcare along with the common deficiencies OCR has observed in its investigations into Security Rule compliance, cybersecurity guidelines, best practices, methodologies, procedures, and processes.

Why Companies Need to Extend Penetration Testing to OT Environments

As companies continue to integrate their operational technology (OT) and IT environments, they’re coming to grips with the fact that this move opens them up to new avenues for cyber threats. The solution is multi-faceted, but one aspect is clear: combining OT and IT requires extending offensive security measures, such as penetration testing, to the OT environment.

From Retail Rampages to 2FA Fails: Trustwave's Wild Ride Through the 2024 Cybersecurity Circus

As always in cybersecurity, hardly a dull day went by in 2024. So much happened we thought it might be helpful to remind everyone what went down over the last 12 months. At least from a Trustwave SpiderLabs perspective. Here are the top SpiderLabs’ blogs, as voted by viewer readership analytics: Trustwave SpiderLabs would like to thank all its readers and we hope we informed, inspired and maybe made you laugh a few times in 2024. See you all next week in 2025.

MSSP Alert, CRN, and Comparably Honor Trustwave in 2024

Cybersecurity industry analysts were not the only group touting Trustwave. In 2024, a variety of media and workplace reviewing sources hailed Trustwave not only for our security solutions but as a great place to work. Because Trustwave is proud of how our employees perceive us let's take a look at the awards issued by Comparably, a leading workplace culture and compensation monitoring employee review platform. Trustwave was awarded three Comparably awards in 2024.

A Year of Recognition: Trustwave's 2024 Industry Analyst Highlights

As we reflect on the past year, we're incredibly proud to share that Trustwave has been recognized by some of the most respected industry analyst firms. These accolades, spanning a variety of security services and global regions, solidify our position as a global leader in cybersecurity.

Phishing, BEC, and Beyond: How Trustwave MailMarshal Enhances Your Email Security Posture

Fact: An organization of any size has employees that receive email. Fact: Threat actors, with the help of apps like ChatGPT, are becoming more efficient at creating compelling phishing emails. Fact: The law of averages mandates an attack will succeed when a staffer is fooled and opens a malicious email or clicks on the wrong link. Fact: A robust email security strategy, which includes a Secure Email Gateway, is a must to protect against email-borne attacks.