Under Attack? Breach Response Hotline: Call 833.997.7327

RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Blog Images (27)
REvil’s Ransomware Infrastructure Restarts After Months of Inactivity
26 April 2022
Security researchers discovered a new REvil leak website being promoted on a forum marketplace, RuTOR, that focuses on Russian-speaking regions. After...
Blog Images (25)
FBI Issues Warning About Ransomware Targeting US Agriculture Sector
23 April 2022
The United States Federal Bureau of Investigation (FBI) issued a warning to Food and Agriculture (FA) sector companies about an increased risk of ransomware...
April 22_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: April 22, 2022
22 April 2022
The ransomware threat landscape is consistently active and evolving, as this week’s installment of the ‘Weekly Ransomware Wrap-Up’ demonstrates. Cybersecurity...
Blog Images (23)
Conti Ransomware Severely Impacting the Healthcare Industry
22 April 2022
During the height of the COVID-19 pandemic, one of the most ruthless and successful Russian ransomware groups, Conti, publicly announced that it would...
Blog Images (24)
How to Detect Warning Signs of Ransomware Attacks
21 April 2022
Ransomware is one of the most devastating threats for businesses of all sizes within every industry. For many organizations, especially small and midsize...
Blog Images (22)
Connections Found Between Karakurt and Two High-Profile Ransomware Groups
20 April 2022
Researchers discovered financial and technological connections between the Karakurt cybercriminal group and two high-profile ransomware actors, Conti and...
Blog Images (21)
OldGremlin Resurfaces With Ransomware Targeting Russian Mining Organization
19 April 2022
A lesser-known threat actor, OldGremlin, which uses its advanced skills to run meticulously planned, sporadic campaigns resurfaced last month after being...
Blog Images (15)
LockBit Ransomware Lurked in U.S. Government Network for Months
18 April 2022
Security researchers discovered the LockBit ransomware that breached a regional United States government agency lurked in the network for five months before...
Untitled design (8)
Critical Vulnerability in Remote Procedure Call Requires Immediate Patch
15 April 2022
Critical Vulnerability Alert During Microsoft’s most recent ‘Patch Tuesday’ announcement, its team shared information about the need to immediately patch...
April 15_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: April 15, 2022
15 April 2022
This newest episode of Weekly Ransomware Wrap-Up reinforces the reality that threat actors are tirelessly seeking ways to access and ransom business-critical...
Blog Images (14)
Pre-Breach Assessments Can Mitigate the Growing Threat of Ransomware
14 April 2022
A new report that surveyed 1200 IT security professionals in 17 countries around the world has shown a dramatic rise in companies willing to pay ransoms...
Blog Images (11)
FBI Warns of Ransomware Attacks Against Healthcare and Local Governments
12 April 2022
The Federal Bureau of Investigation (FBI) issued a warning about ransomware attacks disrupting public services, including utilities, emergency services,...
decryption services
How Decryption Services Can Help Recover Companies' Data
12 April 2022
What is Decryption? In today’s landscape of cyberattacks, a favorite tactic of threat actors is to encrypt data and hold it for ransom using any number...
Blog Images (8)
How To Best Prepare For the Future of Ransomware
11 April 2022
The world of ransomware is constantly evolving. It’s a never-ending cat-and-mouse game in which malicious and deceptive cybercriminals wreak havoc on companies...
Blog Images (12)
Borat Expands RAT Capabilities with Ransomware and DDoS
09 April 2022
Borat, a new remote access trojan (RAT), offers threat actors a menu of cyberattack tactics to choose from. Cybercriminals usually use RATs to gain full...
April 8_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: April 8, 2022
08 April 2022
Today’s installment of ‘Weekly Ransomware Wrap-Up’ is a reminder that threat actors are constantly retooling and searching for organizational security...
Blog Images (10)
Constructing A Roadmap for Borderless Cyber Threats
08 April 2022
The United States Secret Service has a motto that every agent strives to affirm and demonstrate daily: “Worthy of Trust and Confidence”. Whether protecting...
Blog Images (9)
Having a Formal Ransomware Response Plan Is Necessary for Businesses
07 April 2022
According to research from a French multinational company, malware, ransomware, and phishing are plaguing global companies: 21% experienced a ransomware...
Blog Images (5)
Partnering With External Cybersecurity Benefits MSPs and Their Clients
05 April 2022
Having the right cybersecurity measures in place is critical for every Managed Service Provider (MSP) regardless of type or size. Cyberattacks on global...
Blog Images (3)
Break the Ransomware Cycle By Neutralizing Precursor Malware
04 April 2022
Ransomware is among the most feared cyber threats as it puts sensitive data at risk and costs businesses millions of dollars in damages, downtime, and...
1 2 3 4 19

Total Economic Impact™ Of SpearTip ShadowSpear