Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Managed Database Security Enhances Compliance, Privacy, and Threat Defense for the Financial Services Sector

Financial institutions are robbed in innumerable ways. Gunmen conduct physical attacks on bank branches; people commit credit card fraud; hackers attempt to break into ATMs and force them to spit out thousands of dollars, while other threat actors seek to bypass these small-scale incidents and go for millions via a cyberattack. After all, why steal a couple of thousand dollars, pounds, or Euros if you can attempt to blackmail an organization for millions, steal and sell its data, or a little bit of both?

Resurgence of a Fake Captcha Malware Campaign

During an Advanced Continual Threat Hunt (ACTH) investigation in early February 2025, Trustwave SpiderLabs discovered a resurgence of fake CAPTCHA verifications designed to deceive victims into executing malicious PowerShell scripts. This campaign employs a multi-stage PowerShell execution process, ultimately delivering infostealers such as Lumma and Vidar.

Is Your Organization's Cloud Environment as Secure as You Think? Trustwave Can Help

Organizations today face a growing volume of data and alerts while dealing with tight budgets and vulnerable legacy systems. Which is why they need the security partners with the right tools that can help them make the correct security choice for their environment, and this is where Trustwave Microsoft Security Threat Protection and Sentinel Engagements (also referred to as Modern Work and Modern SecOps) come into play.

A Deep Dive into Strela Stealer and how it Targets European Countries

Infostealers have dominated the malware landscape due to the ease of threat operations maintenance, and a wide group of potential victims. In this blog, we take a closer look at a unique infostealer designed to precisely target a narrow data set on systems located in chosen geographic locations. The Strela Stealer (rus. Cтрела, lit. 'Arrow') is an infostealer that exfiltrates email log-in credentials and has been in the wild since late 2022.

Defending Manufacturing: How Cybercriminals Are Targeting the Industry and How to Respond

As noted in the just-released Trustwave SpiderLabs report, 2025 Trustwave Risk Radar Report: Manufacturing Sector, modern manufacturing systems are increasingly interconnected, creating fertile ground for cybercriminals. The report details the weaknesses attackers exploit in infrastructure, workers, and the digital supply chain. Among the various tactics observed, vulnerability exploitation stood out due to its prevalence and potential impact.

The Microsoft Security Score: The Future Benchmark of Enterprise Security and Trust

Trustwave has engaged with hundreds of enterprise customers across Australia and worldwide, and one overarching theme continues to emerge. Cybersecurity is no longer an IT problem; it is a core business concern. Executives, board members, procurement teams, and even marketing departments are beginning to realize that security is not just about preventing breaches but about establishing trust, enabling business, and gaining competitive advantage.

1:1 Cybersecurity Chat with Amelia Gowa at CISO Sydney 2024 | Filmed by AZK Media

Filmed at CISO Sydney 2024 by AZK Media, this exclusive conversation with Amelia Gowa, Trustwave’s NSW State Director, explores the key cybersecurity challenges facing organizations today. In this interview, Amelia shares her insights on: The evolving threat landscape in 2025 How AI, IoT, and cloud are reshaping cybersecurity risks The impact of third-party dependencies and shadow IT Why a proactive, intelligence-led security strategy is essential.

The Russia-Ukraine Cyber War Part 3: Attacks on Telecom and Critical Infrastructure

This post is the third part of our blog series that tackles the Russia-Ukraine war in the digital realm. In this installment, we take a look at how both countries disrupted operations and services in the telecommunications, critical infrastructure, and technology sectors.

Why Offensive Security Should Be a Top Priority, Not Just a Check-the-Box Compliance Requirement

The following is a guest blog by Lisel Newton, Executive Director, Information Security, Risk & Compliance at Gossamer Bio. When it comes to cybersecurity, too many companies treat offensive security measures, such as Red Team exercises and penetration testing, as mere compliance checkboxes. Gossamer Bio, however, prioritizes offensive security as an integral component of our proactive defense strategy rather than just a regulatory requirement.

Generative AI: Essential Insights for CISOs on Security Impacts

Generative AI (GenAI) is transforming the cybersecurity landscape, requiring Chief Information Security Officers (CISOs) and their teams to adapt quickly to both opportunities and challenges, according to the Gartner report 4 Ways Generative AI Will Impact CISOs and Their Teams. As organizations integrate GenAI into business processes, it is critical to secure not only the technology’s development but also its consumption across the enterprise.