Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Modern application control, done right with least privilege

When attackers gain access to a single endpoint—like a developer’s workstation or an HR system—it’s often game over. With some skill and patience, that foothold can escalate into full-blown disruption: stolen data, operational downtime, and brand damage. For years, technologies like application control have served as the frontline defense against this. But in a world rife with rapid change and evolving threats, traditional approaches are showing their age.

Greedy Sponge Targets Mexico with AllaKore RAT and SystemBC

A financially-motivated threat actor, active since early 2021, has been targeting Mexican organizations with custom packaged installers that deliver a modified version of AllaKore RAT. Arctic Wolf documented 2022 and 2023 campaign samples from this unidentified threat actor in a previous report. We are now referring to this group as Greedy Sponge, due to its financial focus and prior use of a popular “SpongeBob” meme on its C2.

Unmasking Malicious APKs: Android Malware Blending Click Fraud and Credential Theft

Malicious APKs (Android Package Kit files) continue to serve as one of the most persistent and adaptable delivery mechanisms in mobile threat campaigns. Threat actors routinely exploit social engineering and off-market distribution to bypass conventional security controls and capitalize on user trust to steal a variety of data, such as log in credentials.

Trustwave MDR Accelerates Automotive Company's Cybersecurity Posture

For many organizations, especially those in industries like automotive manufacturing, navigating escalating cyber threats and meeting stringent insurance requirements is no simple endeavor. This is where a robust solution like Trustwave Managed Detection and Response (MDR) can make all the difference.

Secure Employee Offboarding with Workday Integration

The offboarding phase is a critical time to manage risk and protect sensitive data. With the new Workday integration, departing users are automatically added to a designated Active Directory group. Falcon Identity Protection and Falcon Data Protection then apply real-time controls to block unauthorized access and prevent data exfiltration—watch the demo to see it in action!