Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Pixel-Perfect Trap: The Surge of SVG-Borne Phishing Attacks

Ever thought an image file could be part of a cyber threat? The Trustwave SpiderLabs Email Security team has identified a major spike in SVG image-based attacks, where harmless-looking graphics are being used to hide dangerous links. This blog post analyzes the various techniques cybercriminals are using to cleverly weaponize these image files in phishing attacks and what your organization can do to prevent these pixel-perfect tricks.

AI and AppSec: A Partnership to Prevent Breaches

As software development accelerates, cyberattacks are also growing more sophisticated. The result? Traditional security methods are often rendered ineffective. With reactive strategies and stretched resources, application security (AppSec) teams are under increasing pressure to secure apps without sacrificing speed and innovation. Artificial intelligence (AI) has quickly become the frontrunner solution, automating labor-intensive tasks, improving accuracy, and enabling proactive security measures.

OCULAR SPIDER and the Rise of Ransomware-as-a-Service

Ransomware has become more difficult for organizations to defend against, but easier for adversaries to deploy. The rise of ransomware-as-a-service (RaaS) — a model in which ransomware operators write the malware and affiliates pay to launch it — has lowered the barrier to entry so threat actors of all skill levels can participate and profit.

United Nations Urges Global Action as Cyberattacks Threaten Healthcare Systems

The threat facing healthcare organizations worldwide is being recognized at the highest level, with the United Nations calling for international cooperation to combat the issue. The international organization has asked its members to support fellow member nations by providing technical assistance and guidelines to bolster the resilience of health infrastructure against attack.

Trilio at KubeCon Europe 2025: Innovation, Inspiration, and a Whole Lot of Community Love

What a week it was in London! KubeCon + CloudNativeCon Europe 2025 had all the energy of a music festival for cloud-native tech — and it didn’t disappoint. I had the pleasure of hitting the ground with Kevin Jackson and Rodolfo Casas, and right from the start, it felt like we were back with our extended family.

Cybersecurity Modernization Summit: Moving From Reactive Threat Detection and Response to Proactive

Jake Williams, SVP of Modernization at Scoop News Group and Datadog VP Bianca Lankford for a conversation to learn more about how real-time threat detection paired with rich observability insights is helping organizations to achieve faster security outcomes. This conversation will also address the role auto-remediation plays in the future of government cybersecurity.

Silent Ransom Group "Call-back" Phishing Campaign

Arctic Wolf has observed an uptick in activity from the Silent Ransom Group, a cybercriminal group first identified in 2020 and notorious for its targeted cyber extortion campaigns driven by financial gain. This week, the group has been targeting the legal industry using “call-back” phishing tactics. The group sends emails impersonating services such as Duolingo or Masterclass, claiming a pending charge and urging recipients to call a phone number to resolve the issue.

From Zero to Hero: Master Kubernetes Backup with Palette VMO by Spectro Cloud

Kubernetes has become the foundation for modern applications—but with great flexibility comes greater complexity and risk. Whether it’s an accidental misconfiguration, a failed update, or a cluster-wide outage, disruptions happen fast—and when they do, they impact both your containers and the virtual machines (VMs) running alongside them. In these high-stakes moments, your recovery plan is what makes the difference between a brief hiccup and a full-blown disaster.