
Blog
-
Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used
Chinese ‘kill switches’ found in Chinese-made power inverters in US solar farm equipment that could let Beijing remotely disable power…
-
PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files
A new information-stealing malware dubbed ‘PupkinStealer’ has been identified by cybersecurity researchers, targeting sensitive user data through a straightforward yet…
-
Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
Tim Toole reports: A ransomware attack on Business Systems House (BSH), a Middle Eastern partner of payroll provider ADP, led…
-
Malware Defense 101 – Identifying and Removing Modern Threats
The cybersecurity landscape in 2025 is defined by increasingly sophisticated malware threats, with attackers leveraging artificial intelligence, evasion tactics, and…
-
Malicious HWP Document Disguised as Reunification Education Support Application
A deceptive HWP document, masquerading as a reunification education support application, was discovered on March 5. The document, when opened,…
-
Mass Scanning and Exploit Campaigns
Trustwave SpiderLabs has identified ongoing malicious activities originating from Proton66 ASN, including vulnerability scanning, exploit attempts, and phishing campaigns. The…
-
PixelPerfect Trap: The Surge of SVGBorne Phishing Attacks
The Trustwave SpiderLabs Email Security team has identified a significant increase in SVG image-based attacks, where seemingly harmless graphics are…
-
Part 2: Compromised WordPress Pages and Malware Campaigns
This analysis focuses on malware campaigns linked to Proton66, particularly those targeting Android devices through compromised WordPress websites. The threat…
-
Actionable threat hunting with Threat Intelligence (I) Hunting malicious desktop files
This analysis explores the detection of malicious .desktop files used by threat actors to infect Linux systems. It explains the…
-
Actionable threat hunting with Threat Intelligence (I) Hunting malicious desktop files
This analysis explores the detection of malicious .desktop files used by threat actors to infect Linux systems. It explains the…

