RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Blog Images (94)
A Bank’s Closure is Threat Operators’ Opportunity: Be Prepared
20 March 2023
Recently, Silicon Valley Bank (SVB) was closed by the California Department of Financial Protection and Innovation following a bank run triggered by an...
Blog Images (96)
Data Stolen From LA Housing Authority After Ransomware Attack
18 March 2023
The Housing Authority of the City of Los Angeles (HACLA) issued a “data security event” warning after the LockBit ransomware group targeted the organization...
Blog Images (93)
CISA Warns RCE Vulnerability in VMware Exploited in Cyberattacks
17 March 2023
A critical severity vulnerability in VMware’s Cloud Foundation was added to the CISA’s list of security flaws exploited in the wild. The vulnerability,...
March 17, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: March 17, 2023
17 March 2023
Ransomware attacks and data breaches are increasing across all industry sectors, demonstrating the need for companies to enhance their security posture...
Blog Images (92)
Critical Infrastructure and Industrial Control Systems Remain Vulnerable Targets
16 March 2023
Experts in national defense and security have long anticipated that future warfare will not involve firearms, but use code designed to disable services...
Blog Images (85)
A Growing Threat to Companies in the Digital World: Crime-As-A-Service
15 March 2023
Cybercriminals have devised ways to sell their illicit actions in recent years. The rise of “Crime-as-a-Service” (CaaS), which is offering criminal tools...
Blog Images (87)
Threat Group’s New Encryptor Targets Linux, Windows Systems
14 March 2023
Threat actors connected with the IceFire ransomware operation are actively targeting global Linux systems with a new specialized encryptor. Beginning in...
Blog Images (86)
New Malware Variant Avoids Detection With 'Radio Silence' Mode
13 March 2023
Sharp Panda, a cyber-espionage threat operator group, is using a new version of the “Soul” malware framework to target high-profile government agencies...
Blog Images (84)
Europol Targeted Core Members of DoppelPaymer Ransomware Group
11 March 2023
Europol announced an operation with law enforcement in Germany and Ukraine targeting two individuals suspected to be core members of the DoppelPaymer ransomware...
March 10, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: March 10, 2023
10 March 2023
The cyber threat landscape continues to devastate enterprise businesses, healthcare providers, and government entities with attacks against critical resources....
Blog Images (79)
Businesses Need Layered Password Protections for Enhanced Security
10 March 2023
The most foundational aspect of protecting yourself and your business from the devastating impact of a data breach is maintaining best practices regarding...
Blog Images (82)
CISA Warning About ZK Java Framework RCE Flaw Exploited by Threat Operators
09 March 2023
CVE-2022-36537 was added to the United States Cybersecurity & Infrastructure Security Agency (CISA) “Known Exploited Vulnerabilities Catalog” after...
Blog Images (83)
FBI and CISA Warn Of Increasing Royal Ransomware Attacks
08 March 2023
CISA and the FBI have released a joint advisory about the growing threat posed by Royal ransomware attacks targeting numerous critical infrastructure sectors...
Blog Images (78)
PureCrypter Targeting Governments with Ransomware and Info-Stealer
07 March 2023
A threat actor has been discovered delivering numerous information stealers and ransomware strains to government agencies using the PureCrypter malware...
Blog Images (81)
New U.S. National Cybersecurity Plan Revealed by White House
06 March 2023
The Biden administration unveiled its national cybersecurity strategy, which focuses on having software vendors and service providers handle the responsibility...
Blog Images (80)
New Post-Exploitation Tool Connected to Prominent Threat Group
04 March 2023
Threat actors are advocating a new post-exploitation framework called “Exfiltrator-22”, which is designed to distribute ransomware in companies’ networks...
March 3, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: March 3, 2023
03 March 2023
Ransomware attacks continue to devastate businesses, critical infrastructure, and society generally. Given this challenging threat landscape, it is imperative...
Blog Images (77)
NSA’s Guidance for Securing Home Networks for Remote Workers
02 March 2023
The United States National Security Agency (NSA) provided recommendations to assist remote workers in securing their home networks and defending their...
Blog Images (75)
Ransomware Attacks Continue To Exploit Old Bugs
01 March 2023
Numerous vulnerabilities used by ransomware operators in 2022 attacks were years old, allowing threat operators to develop persistence and move laterally...
Blog Images (76)
Top Cyber Threats of 2022 Looking to Continue in 2023
28 February 2023
The threat landscape is extremely diversified, with attacks ranging in sophistication from simple scams to nation-state-level cyber espionage. However,...
1 2 3 29

Categories

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks.

View Our ShadowSpear Platform Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Weekly Ransomware Wrap-ups details the weekly insights on ransomware groups, new tactics they're employing, and who they impacted.

View Our Wrap-Ups

Translate »

Total Economic Impact™ Of SpearTip ShadowSpear