Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Will the UK's Ransomware Proposal Work? Trustwave Weighs in on the Potential Impact

The recent UK Home Office proposal designed to hinder and disrupt ransomware operations through several proposed measures, including a targeted ban on ransomware payments, has again brought this question into the public square. The question of whether to pay a ransom demand is a decades-long argument with ardent opinions on both sides.

AI Powered Data Classification: A Game Changer or Just Hype?

In this episode of Into the Breach, James Purvis, Drew Russell, and Dan Eldad dive into the exciting yet complex world of AI-powered data classification. Is it truly a game changer, or just overhyped? They explore the potential of AI to revolutionize data classification, its limitations, and where traditional methods still hold value. The discussion also covers practical use cases, cost implications, and the future of AI in data security.

Trustwave SpiderLabs: Examining How New Ransomware Groups Emerge

Two newcomers have made their way onto the ransomware threat group stage, becoming the biggest threat to the energy and utilities sector in 2025. According to the most recent data from Trustwave SpiderLabs’ Energy and Utilities Sector Deep Dive: Ransomware Threat Groups, Hunters International and Qilin (pronounced Chee Lin) displaced LockBit as the most active group attacking these sectors.

Securing Microsoft 365 in the Age of Ransomware

Here are the top five reasons why safeguarding your M365 environment is critical, especially in recent years: Our team of experienced security experts here at Opti9 have devised a comprehensive list of actionable items to improve the security posture of your Microsoft 365 environments. Here are a few action items to properly protect your Microsoft 365 environment.

Warning: Phishing Campaign Targets Germany with New Malware

Researchers at Cisco Talos warn that a new phishing campaign is targeting users in Germany and Poland in an attempt to deliver several strains of malware, including a new backdoor dubbed “TorNet.” The phishing emails purport to be fake money transfer confirmations from financial institutions or phony order receipts from manufacturing and logistics companies.

How Trustwave's Fusion Platform Analyzes Ransomware Tactics in the Energy Sector: A Comprehensive Overview

Trustwave SpiderLabs has multiple methods and tools available to keep its teams apprised of the tactics, techniques, and procedures (TTPs) threat groups utilize during an attack, but perhaps the most useful is our cloud-native Fusion dashboard.

Inside the Black Basta Arsenal: A Deep Dive into the Tools Fueling Their 2024 Ransomware Campaigns

Here's a closer look at one such advanced malware employed with tools by Black Basta—to name a few, Zbot, DarkGate, and customer-designed payloads on order as well—and how these latter help in extracting data coupled with sustaining unauthorized access at some distance. Introduction.

The Ultimate Guide To Ransomware: Understanding, Identifying and Preventing Attacks

Ransomware is one of the most prominent cybersecurity threats today, often spreading via phishing emails, malicious links, infected attachments, or exploiting software vulnerabilities. It is a type of malware designed to block access to files, data, or entire systems until a ransom is paid, usually in cryptocurrency. Beyond the financial impact, ransomware causes operational disruption and long-term reputational damage. The frequency and scale of ransomware attacks have surged in recent years.