Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Mother of All Breaches: A Corporate Credential Security Wake-Up Call

Cybersecurity researchers uncovered what is being called the "mother of all breaches," a colossal dataset containing 16 billion login credentials, including user passwords for Google, Facebook, and Apple. To put that figure in context, the cache represents twice the current human population of the Earth. This event was not the result of a single breach, but likely a compilation of data stolen from multiple breaches over many years.

The User Risk Puzzle: Why Your Security Tools Don't Add Up

As a security leader, you face an inevitable daily reality: a flood of alerts pouring in from dozens of different tools. Risky sign-ins are flagged in Microsoft 365, weak passwords are pinged from a vault audit, and a separate report identifies which employees failed the latest phishing simulation. While all this information is valuable, most leaders are unable to connect these separate data points to paint a clear, cohesive picture of an individual user’s overall risk.

Trustwave SpiderLabs' 2025 Risk Radar Report: Technology Sector

Threat actors know that technology makes the world go round, and these adversaries are more than willing to use every cyber weapon at their disposal to take advantage of that fact, according to Trustwave SpiderLabs’ 2025 Trustwave Risk Radar Report: Technology Sector.

CISOs Brace for a Wave of AI-Powered, Domain-Based Cyber Threats

Domain-name system (DNS)- based cyber attacks are becoming increasingly complex, and AI will only make managing them even more challenging. According to a recent report, Chief Information Security Officers (CISOs) anticipate a tumultuous season of cyber threats, with low confidence in their abilities to defend against them effectively.

Exposed and Exploited: Trustwave Uncovers the Alarming Cyber Risks Lurking in the Tech Sector

Trustwave SpiderLabs' upcoming report, the 2025 Trustwave Risk Radar Report: Technology Sector, will be released on June 25 and will delve into the threats in the technology industry and how to stay secure. The report, an update on the team’s 2024 Technology Threat Intelligence Briefing and Mitigation Strategies, provides a comprehensive analysis of novel cybercriminal tactics and techniques, identifying the top trends that significantly affect the technology industry.

Leading the Next Evolution of Cybersecurity: From Threat Management to Real-Time Risk

The cybersecurity landscape has reached a turning point. In this article, George Patsis, CEO of Obrela, challenges the traditional, tool-centric approach to cyber defense and goes through Obrela’s ground breaking approach to: real-time risk management. With cyber threats growing more complex and unpredictable, organizations must shift from reactive threat detection to a context-aware, business-aligned risk management.

From Code to Conversations: How Modern AI Creates New Classes of Data Risk

The rise of generative AI has fundamentally changed how we work, create, and collaborate. But as organizations rush to integrate AI tools into their workflows, they're inadvertently creating entirely new categories of data risk that traditional security measures weren't designed to handle.

CVE Trends to Watch: Real-World Risks to Telecom and Professional Services

Cybersecurity weaknesses span both software and hardware systems, creating numerous opportunities for exploitation. Among the most common access vectors leveraged by threat actors are phishing attacks and Common Vulnerabilities and Exposures (CVEs). When left unpatched, CVEs can pose significant risks to an organization’s systems, exposing sensitive data and operational assets to potential compromise.