Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Best-Of-Breed Security Is Always Important-but for SIEM, It's Imperative

Which approach provides superior cybersecurity: a single-vendor platform portfolio or a multivendor best-of-breed ecosystem? Superficially, single-vendor platforms seem to have various advantages: But take a closer look, and glaring gaps appear. Multiple, headline-grabbing security incidents have involved large platform players, and if you’re a seasoned cybersecurity leader, you should consider the risks associated with putting all your eggs in one basket.

How to Block Websites on Android Phone & Tablet?

Are your employees accessing restricted websites during work hours? Unrestricted web access on company devices can lead to decreased productivity and increased security risks. For businesses, controlling online activity on work-issued Android phones and tablets is essential to maintaining a secure and focused work environment.

Will the UK's Ransomware Proposal Work? Trustwave Weighs in on the Potential Impact

The recent UK Home Office proposal designed to hinder and disrupt ransomware operations through several proposed measures, including a targeted ban on ransomware payments, has again brought this question into the public square. The question of whether to pay a ransom demand is a decades-long argument with ardent opinions on both sides.

Top Cyber Threats Facing Manufacturing and How To Mitigate Them

The top cyber threats facing the manufacturing industry are ransomware, supply chain attacks, insider threats, phishing and social engineering attacks. In 2023, the manufacturing sector accounted for 25% of all cyber attacks, making it the most targeted industry. As the manufacturing industry increasingly relies on the Internet of Things (IoT) to improve efficiency and productivity, addressing security risks has become essential.

Fake VS Code Extension on npm Spreads Multi-Stage Malware

In a recent discovery, our research team uncovered a fake VS-code extension—truffelvscode—typosquatting the popular truffle for VS-code extension. This extension serves as a trojan horse for multi-stage malware. This blog takes a closer look at how the malicious extension operates, its obfuscation techniques, and IOCs related to this incident.

2025 OWASP Top 10 for LLM Applications: A Quick Guide

Published first as a whitepaper in late 2024, the 2025 OWASP Top 10 for LLM Applications is yet another monumental effort from OWASP made possible by a large number of experts in the fields of AI, cybersecurity, cloud technology, and beyond—including Mend.io Head of AI Bar-El Tayouri. LLMs are still new to the market but beginning to mature, and the OWASP Top 10 for LLM Applications is maturing alongside it.

How CISOs Can Build a Cybersecurity-First Culture

Creating an enterprise security-first culture is one of the most impactful things a CISO can do to protect their organization. Sure, high-tech solutions and fancy tools are important, but they are largely ineffective when staff are unable or unwilling to play their part in preventing, identifying, and reporting security incidents. However, in the quest to develop a positive cybersecurity culture, many Chief Information Security Officers (CISOs) inadvertently create a toxic environment.

Communicating Cyber Risk at the Board Level: 7 Lessons for 2025

‍As digital threats grow more sophisticated and cyber regulations expand in scope, business stakeholders are beginning to recognize the need to learn more about cybersecurity and how it impacts organizational performance. With this recognition comes the elevation of chief information security officers (CISOs) into the boardroom, tasked with explaining these cyber intricacies and offering strategies that can help safeguard operational resilience and drive long-term growth.

Make-Shift Brand Impersonation: Abusing Trusted Domains with Open Redirects

A KnowBe4 Threat Lab publication Authors: Daniel Netto, Jeewan Singh Jalal, Anand Bodke, and Martin Kraemer Executive Summary Attackers exploit redirects that lack safeguarding mechanisms to borrow the domain reputation of the redirect service, obfuscate the actual destination and exploit trust in known sources. Whitelisting URLs, only allowing a predefined set of URLs to be rewritten, is an effective countermeasures against the vulnerability on the server side.

Warning: Organizations Need to Prep For AI-Powered Ransomware Attacks

The rise of agentic AI tools will transform the cybercrime landscape, according to a new report from Malwarebytes. Agentic AI—which is still under development—is a step above the generative AI tools that are currently available to the public, and will likely be widely released in 2025. While these tools will have many legitimate uses, they’ll also enable cybercriminals to scale their attacks.