Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dire Wolf Strikes: New Ransomware Group Targeting Global Sectors

Dire Wolf is a newly emerged ransomware group first observed in May 2025 and Trustwave SpiderLabs recently uncovered a Dire Wolf ransomware sample that revealed for the first time key details about how the ransomware operates. Since its discovery, Dire Wolf ransomware group has launched a series of targeted attacks across multiple sectors and regions with an emphasis on manufacturing and technology sectors.

Exposed and Exploited: Trustwave Uncovers the Alarming Cyber Risks Lurking in the Tech Sector

Trustwave SpiderLabs' upcoming report, the 2025 Trustwave Risk Radar Report: Technology Sector, will be released on June 25 and will delve into the threats in the technology industry and how to stay secure. The report, an update on the team’s 2024 Technology Threat Intelligence Briefing and Mitigation Strategies, provides a comprehensive analysis of novel cybercriminal tactics and techniques, identifying the top trends that significantly affect the technology industry.

What is MXDR? A Modern Approach to Cyber Threat Detection and Response

While organizations deploy various security technologies, modern cyberattacks are often intricate, involving kill chains composed of numerous low-fidelity signals. A key challenge is correlating these alerts across siloed security solutions to gain a complete, enterprise-wide view of the threat.

Unleash the Tiger: Fast, Smart, and Targeted Cybersecurity Testing from Trustwave SpiderLabs

Trustwave's Consulting and Professional Services, spearheaded by our elite SpiderLabs team has been a leader in helping clients through our renowned red and purple team test. Now, we're taking a leap forward with the introduction of Tiger Team Testing, designed to deliver rapid, targeted results at a lower cost.

11 Reasons Why MailMarshal is the Email Security You Need

Email remains the primary communication tool for businesses of all sizes. Unfortunately, threat actors are experts at evading secure email gateways, making email the most exploited entry point for cybercriminals. Recent history is littered with examples of devastating attacks that started with a seemingly innocuous email.

9 Critical Questions to Ask When Choosing an MDR Provider

Managed Detection and Response (MDR) providers are indispensable to organizations seeking to bolster their cybersecurity posture. The proliferation of sophisticated attacks and the persistent shortage of skilled security professionals, outsourcing advanced threat detection, investigation, and response to a specialized MDR provider is a strategic move that cannot be overlooked. However, the market is flooded with vendors, each offering a unique blend of technology and human expertise.

Answering 7 Questions About Trustwave Managed Vulnerability Scanning (MVS)

Understanding and mitigating vulnerabilities is paramount for any organization. Trustwave's Managed Vulnerability Scanning (MVS) offers a comprehensive solution to help businesses stay ahead of potential risks and ensure proper database protection. But what exactly is MVS, and how can it benefit your organization? We've compiled answers to seven key questions about Trustwave MVS, providing a clear overview of its capabilities, benefits, and how it stands out from the crowd.

Cybersecurity in UK Hospitality: Navigating Compliance, Threats, and Resource Constraints

Many of the largest hospitality organizations operate on a global scale. While guest demands remain relatively constant across regions, cyberthreats and defensive capabilities can vary significantly. Trustwave SpiderLabs recently released the 2025 Trustwave Risk Radar Report: Hospitality Sector, providing updated insights and strategies to enhance data security across the industry.

Government Data Breaches Are Eroding Public Trust - It's Time for Stronger Cybersecurity in the Public Sector

The recent data breach at the Australian Human Rights Commission (AHRC) is a stark reminder of what's at stake when public sector cybersecurity falls short. The exposure of sensitive personal information—coupled with a delayed response that exceeded the Notifiable Data Breach (NDB) Scheme's 72-hour notification benchmark—highlights systemic challenges in how government agencies prepare for, detect, and respond to cyber threats. This breach isn't an isolated event.

MDR vs SIEM: Which is Right for Your Organization?

The decision to buy a Security Information and Event Management (SIEM) product or outsource to a Managed Detection and Response (MDR) depends on a number of factors, including the size of your organization, the complexity of your IT infrastructure, and your overall security needs. Before we get into the main discussion, let’s step back and define what we are talking about so everyone is on the same page.