Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing Infrastructure in the Age of Identity Attacks with Ev Kontsevoy

Learn why identity-based attacks are now more common than malware attacks and discover practical strategies to secure your computing infrastructure. The talk covers the economics of cybersecurity, the impact of complexity on human error, and proven approaches to reduce your attack surface. With real data from industry surveys, learn how leading organizations are successfully preventing identity attacks through passwordless authentication, cryptographic identities, and infrastructure simplification.

How (and Why) Cyber Attacks are Exploiting the Supply Chain

Your business is a link in one or more supply chains. Your business depends on those who supply to you, and in turn those you supply to (and their customers and their customers’ customers) depend on you. Any disruption at any point affects the flow of goods, services, and information affecting others in the supply chain. It’s important that we understand the risk in our supply chain and the potential risk we pose to our customers, especially cyber-related risk. Why?

Refresh yourself on 2024's top cyber attack trends to stay safe in 2025

We’re officially in the final days of 2024, a year so eventful it feels difficult to remember half of what happened. We had the Olympics in Paris, which turned the world into fans of sharpshooting, breakdancing, and the pommel horse; a solar eclipse visible in totality from the US for the first time since 1979; and a monthslong, very impassioned rap battle between Kendrick Lamar and Drake.

Email Bombing: Why You Need to be Concerned

Over the last few months, the topic of email bombing has been brought to our attention multiple times, mostly queries from customers that go something like this: “I have a few users experiencing some sort of spam attack, where they are receiving thousands of random registration or subscription emails. What do I do, and why is it occurring? Help!” This scenario is known as email or subscription bombing.

Critical Infrastructure Under Siege: 42% Spike in Ransomware Attacks on Utilities

Ransomware attacks targeting utilities have surged by 42% over the past year, with spear phishing playing a major role in 81% of cases, according to a ReliaQuest study spanning November 2023 to October 2024. Analyzing data from its GreyMatter platform and dark web activity, ReliaQuest found that utilities like water and energy systems are disproportionately affected. Their critical role in infrastructure makes them prime targets for cybercriminals.

The Largest and Most Notorious Cyber Attacks in History

Cyber attacks are deliberate attempts to steal, alter, or destroy data or to disrupt operations and to damage the digital parts of a critical infrastructure. This blog post explores the most destructive major cyber attacks in history, detailing the underlying motives and impact, and then offers prevention and detection best practices.

Trustwave's 2025 Cybersecurity Predictions: AI-Powered Attacks, Critical Infrastructure Risks, and Regulatory Challenges

As 2024 comes to a close, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. Here is the latest installment. As we look ahead to 2025, the landscape of cyber threats continues to evolve, presenting new challenges for cybersecurity professionals.

Account Takeover Protection: How AppTrana Stops Attacks

Worried about account takeovers (ATO)? In this video, watch how AppTrana actively protects against account takeover attacks, such as credential stuffing and brute force attempts. See how AppTrana detects, blocks, and mitigates these threats in real time, keeping your accounts safe and secure. Learn more about AppTrana’s Account Takeover protection.

The Evolution of Cyber Attacks: Lessons for Staying Safe in 2025

The pace at which cyberattacks are evolving has accelerated in recent years, driven by technological advances, particularly artificial intelligence (AI) and machine learning. The sophistication of cybercriminals' tactics has reached unprecedented levels, posing new challenges for traditional cybersecurity defenses. In this article, we will explore the key developments in cyber threats, identify emerging risks, and offer practical lessons on how businesses and individuals can stay safe in 2025.