RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, experienced insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Resources
Awareness of Phishing Scams Can Defend Against Cyberattacks
5 Major Cybersecurity Threats MSPs are Facing Going Into 2023
Top Cyberattack Risks Impacting 8 Industries
6 Evolving Ransomware Trends Shaping the Cybersecurity Landscape
DNS Tunneling
DNS Tunneling: New Tactic To Scan Networks and Track Victims
10 June 2024
In the realm of cybersecurity, a new threat is rising, and it can easily fly under the radar of many security systems. This threat is known as Domain Name...
Mastermind Behind LockBit Ransomware
Mastermind Behind LockBit Ransomware Unveiled and Charged
07 June 2024
The US Justice Department recently charged Dimitry Yuryevich Khoroshev, a 31-year-old Russian citizen, in a 26-count indictment as the alleged mastermind...
Ransom Recovery Costs
Ransom Recovery Costs and the State of Ransomware in 2024
05 June 2024
In recent times, the economic burden of ransom recovery costs has surged drastically. While ransom payments are a significant portion of the financial...
Unchecked User Privileges
Unchecked User Privileges: How to Counter
03 June 2024
Unchecked User Privileges: How to Counter   Chris Swagler | June 3rd, 2024In the modern digital landscape, the risk of unauthorized access is a significant...
Offensive AI-Driven Cyberattacks
Offensive AI-Driven Cyberattacks: Rising Threat
30 May 2024
Offensive AI-Driven Cyberattacks: Rising Threat   Chris Swagler | May 30th, 2024The world of cybersecurity is no stranger to the continuous evolution...
Cloud Migration
Cloud Migration Impact on Network Security
28 May 2024
Cloud Migration Impact on Network Security   Chris Swagler | May 28th, 2024The migration to the cloud has been a significant trend in the technology...
Cuttlefish Malware
Cuttlefish Malware: A New Threat to Routers and Traffic Monitoring
24 May 2024
Cuttlefish Malware: A New Threat to Routers and Traffic Monitoring   Chris Swagler | May 24th, 2024In the ever-evolving world of cyber threats, a...
Security Awareness Training
Security Awareness Training Crucial Role
22 May 2024
Security Awareness Training Crucial Role   Chris Swagler | May 22nd, 2024In the digital age, where data has become the new gold, security awareness...
Phishing Campaign Assessments
Phishing Campaign Assessments Can Be Effective For Companies
20 May 2024
Phishing Campaign Assessments Can Be Effective For Companies   Chris Swagler | May 20th, 2024In the contemporary digital environment, the importance...
Incident Response Planning
Incident Response Planning: Why It's Important
17 May 2024
Incident Response Planning: Why It’s Important   Chris Swagler | May 17th, 2024In the dynamic and increasingly interconnected world of Information...
Ransomware Experiments
Ransomware Experiments on Developing Countries
15 May 2024
Ransomware Experiments on Developing Countries   Chris Swagler | May 15th, 2024A startling revelation has been made by a cybersecurity company that...
Credential Stuffing Attacks
Credential Stuffing Attacks Using TOR: Okta Warning
13 May 2024
Credential Stuffing Attacks Using TOR: Okta Warning   Chris Swagler | May 13th, 202Okta, the widely recognized identity, and access management provider...
Cybersecurity Gap
Close Cybersecurity Gaps through Analysis and Architecture Review
10 May 2024
Close Cybersecurity Gaps through Analysis and Architecture Review   Chris Swagler | May 10th, 2024In the rapidly evolving digital landscape, cybersecurity...
“As Services” Industry
“As Services” Industry Evolved Ransomware Groups
08 May 2024
“As Services” Industry Evolved Ransomware Groups   Chris Swagler | May 8th, 2024The digital landscape, with its myriad of advancements, is not without...
Cloud Monitoring
Cloud Monitoring: Embracing the Power
06 May 2024
Cloud Monitoring: Embracing the Power   Chris Swagler | May 6th, 2024In today’s hyper-connected digital world, businesses constantly look for...
Real Costs of Cybercrimes
Unveiling the Real Costs of Cybercrimes
03 May 2024
Unveiling the Real Costs of Cybercrimes   Chris Swagler | May 3rd, 2024In today’s digital era, an increasing number of organizations and individuals...
Comprehensive Overview of Ransomware
Overview of Ransomware from 2023
01 May 2024
Overview of Ransomware from 2023   Chris Swagler | May 1st, 2024In this digital age, ransomware has emerged as a significant threat to businesses...
CSA Warning
CSA Warning About Security Risks with Evolving Cloud and AI Tech
29 April 2024
CSA Warning About Security Risks with Evolving Cloud and AI Tech     Chris Swagler | April 29th, 2024The Cyber Security Agency of Singapore...
Cyberattack on UnitedHealth's Change Healthcare
Cyberattack on UnitedHealth's Change Healthcare Results in Multi-Million Dollar Loss
26 April 2024
Cyberattack on UnitedHealth’s Change Healthcare Results in Multi-Million Dollar Loss   Chris Swagler | April 26th, 2024In a shocking revelation,...
Industries Vulnerable to Cyberattacks
Industries Vulnerable to Cyberattacks in 2023
24 April 2024
Industries Vulnerable to Cyberattacks in 2023   Chris Swagler | April 24th, 2024The digital age has brought with it an upsurge in technological advancements...
1 2 3 41

Categories

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights