Under Attack? Breach Response Hotline: Call


With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Awareness of Phishing Scams Can Defend Against Cyberattacks
Key Strategies That Can Help MSPs Defend Against Cyberattacks
MSPs Receive Numerous Benefits By Using SOC-as-a-Service
5 Major Cybersecurity Threats MSPs are Facing Going Into 2023
Blog Images (57)
Seiko Hit by Cybersecurity Breach Orchestrated by BlackCat Ransomware Group
22 September 2023
Renowned Japanese watchmaker Seiko Group Corp. has become the latest target of a sophisticated cyberattack executed by the BlackCat/ALPHV ransomware gang....
Blog Images (51)
Rising Business Email Compromise Threat: Exceeding Ransomware Losses
21 September 2023
In an era where digital threats continue to evolve, security experts are sounding the alarm about the persistent danger posed by Business Email Compromise...
Blog Images (56)
Cuba Ransomware Group Adapts Tactics to Exploit Veeam Vulnerability
20 September 2023
The notorious Cuba ransomware gang, renowned for its Russian-speaking origin, has once again demonstrated its adaptability and technological prowess by...
Blog Images (55)
Limiting Ransomware Threats: Three Strategies for CISOs
19 September 2023
The growing threat of ransomware attacks has propelled cybersecurity into uncharted territory. Companies facing the daunting pay-or-not-to-pay dilemma...
MGM Resorts Cyberattack Unveiled: A Closer Look at the ALPHV/BlackCat Ransomware Group
18 September 2023
Blog Images (54)
Ransomware: Targeted Sectors and Pervasive Threats
16 September 2023
The menace of ransomware has grown exponentially over the years, impacting a wide range of sectors across the world. No organization is immune, regardless...
Blog Images (53)
Emergence of New BlackCat Ransomware Variant Using Impacket and RemCom Tools
15 September 2023
Blog Images (48)
Phishing Attack Uses QR Codes to Target U.S. Energy Company
14 September 2023
Blog Images (52)
Evolving Threat Landscape: Unveiling the Triple Extortion Ransomware Ecosystem
13 September 2023
Blog Images (50)
Monti Ransomware Attacks with Enhanced Linux Variant and Advanced Stealth Techniques
12 September 2023
After a two-month hiatus, the Monti ransomware syndicate has returned to the cyber battleground, wielding a potent new Linux iteration of their notorious...
Blog Images (49)
Ransomware Tactics Shift From Data Extortion to 'Customer Service'
11 September 2023
The landscape of cyber threats is constantly evolving, and one particularly intriguing shift has emerged within the realm of ransomware attacks. While...
Education Sector
Surge in Ransomware Attacks Hits Education Sector in August
09 September 2023
As the new school year commenced, the education sector faced a surge in ransomware attacks, causing disruptions and delays at various institutions across...
Business Email Compromise
Emerging Trends in Business Email Compromise (BEC) Attacks
07 September 2023
In the realm of cybersecurity, staying informed is paramount. From advanced persistent threats to previously unknown vulnerabilities, timely and relevant...
Educational Institutions
Protecting Educational Institutions: Countering Ransomware Threats in K-12 and Higher Education
06 September 2023
Ransomware assaults targeting educational institutions extend beyond mere classroom disruptions. These attacks unleash a cascade of consequences, from...
Ransomware Defense
Ransomware Defense: A Guide to Preparation and Response
05 September 2023
Ransomware attacks have emerged as a significant menace to organizations across various sectors. From renowned enterprises to educational institutions,...
Knight ransomware
Deceptive Knight Ransomware Impersonates TripAdvisor Complaints
04 September 2023
Rhysida Ransomware
Unmasking the Connection: Rhysida Ransomware Connected to Vice Society
01 September 2023
AiTM Phishing
Unveiling Multi-Stage AiTM Phishing and BEC Attacks on Financial Institutions
31 August 2023
Financial institutions are prime targets for malicious actors seeking to exploit vulnerabilities. Microsoft has recently exposed a significant threat operation,...
EvilProxy Phishing
EvilProxy Phishing Campaign: Targeting Microsoft 365 Users and Executives
30 August 2023
In a concerning turn of events, the infamous EvilProxy phishing platform has emerged as a potent threat, focusing its attention on Microsoft 365 users,...
How Companies Can Defend Against Phishing Attacks Using AI
29 August 2023
In the ever-evolving landscape of cybersecurity, the rise of artificial intelligence (AI) has both empowered defenders and emboldened attackers. Phishing,...
1 2 3 37


The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Weekly Ransomware Wrap-ups details the weekly insights on ransomware groups, new tactics they’re employing, and who they impacted.

View Our Wrap-Ups