Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trustwave Named a Representative Vendor in 2025 Gartner Market Guide for Co-Managed Security Monitoring Services

For the second consecutive year, Trustwave has been named a Representative Vendor in the just-released 2025 Gartner Market Guide for Co-Managed Security Monitoring Services. "We believe that inclusion in this report is further validation that Trustwave's offerings continue to be aligned with the needs of the market. We feel honored to be recognized in this research out of the field of over 500 participants," says Jesse Emerson, SVP of Product Management & Solutions Engineering.

Proton66 Part 1: Mass Scanning and Exploit Campaigns

Trustwave SpiderLabs continuously tracks a range of malicious activities originating from Proton66 ASN, including vulnerability scanning, exploit attempts, and phishing campaigns leading to malware infections. In this two-part series, SpiderLabs explores the malicious traffic associated with Proton66, revealing the extent and nature of these attacks.

Securing the Energy Sector: The Backbone of the UK's AI Ambitions

The UK’s ambition to become a global leader in artificial intelligence (AI) marks a transformative era. However, the foundation of this progress—the energy sector—has emerged as a prime target for cybercriminals. While AI-driven technologies offer greater efficiency and resilience, they also heighten the sector’s vulnerability to cyberattacks. To sustain the nation’s AI advancements, ensuring the security of the energy infrastructure must be a critical priority.

Tycoon2FA New Evasion Technique for 2025

The Tycoon 2FA phishing kit has adopted several new evasion techniques aimed at slipping past endpoints and detection systems. These include using a custom CAPTCHA rendered via HTML5 canvas, invisible Unicode characters in obfuscated JavaScript, and anti-debugging scripts to thwart inspection. This blog takes a closer look at these methods to better understand how this kit is evolving and what defenders should be aware of.

United Nations Urges Global Action as Cyberattacks Threaten Healthcare Systems

The threat facing healthcare organizations worldwide is being recognized at the highest level, with the United Nations calling for international cooperation to combat the issue. The international organization has asked its members to support fellow member nations by providing technical assistance and guidelines to bolster the resilience of health infrastructure against attack.

Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks

Ever thought an image file could be part of a cyber threat? The Trustwave SpiderLabs Email Security team has identified a major spike in SVG image-based attacks, where harmless-looking graphics are being used to hide dangerous links. This blog post analyzes the various techniques cybercriminals are using to cleverly weaponize these image files in phishing attacks and what your organization can do to prevent these pixel-perfect tricks.

[REPORT] Future-Proof Your Firm: Actional Cybersecurity for Professional Services and Legal

Professional services firms, including legal service entities, are prime targets for cyberattacks due to the wealth of sensitive data they hold. This treasure trove includes intellectual property, financial information, legal documents, and personal client details. A cyberattack can severely damage a firm's reputation, as clients entrust them with keeping their data confidential and secure. As a result, robust cybersecurity is a critical priority for these information-rich firms.

Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse

In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta, a prolific ransomware group. Trustwave SpiderLabs has taken an in-depth look at the leaked contents, which spell out in detail how the group thinks and operates, revealing discussions on tactics and the effectiveness of various attack tools. Even going so far as to debate the ethical and legal implications of targeting Ascension Health.

Why Strong Passwords are Still the Best Defence Against Cyber Threats

After covering the importance of unique usernames in yesterday's blog, we would be remiss not to take a look at the second half of most login credentials: passwords. These are important because, despite increasingly sophisticated cybersecurity technologies and methodologies, 86% of breaches still involve stolen credentials.