With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Awareness of Phishing Scams Can Defend Against Cyberattacks
Key Strategies That Can Help MSPs Defend Against Cyberattacks
MSPs Receive Numerous Benefits By Using SOC-as-a-Service
5 Major Cybersecurity Threats MSPs are Facing Going Into 2023
Blog Images (21)
Five Eyes Nations Face Growing Ransomware Threat
16 May 2023
Ransomware is the most severe threat to Five Eyes collation nations, and it’s worsening with financial gain no longer being the sole goal for threat...
Blog Images (26)
North Korean Threat Group Finds Security Gaps with New Recon Tool
15 May 2023
The North Korean Kimsuky operating group has been seen using a new version of its reconnaissance malware, called “ReconShark,” in a global...
Blog Images (31)
New DDoS Botnet Malware Exploiting Critical RCE Ruckus Flaw
13 May 2023
“AndoryuBot,” a new malware, is attempting to infect unpatched Wi-Fi access points for use in DDoS attacks by exploiting a critical-severity flaw in the...
May 12, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: May 12, 2023
12 May 2023
Ransomware and various cyberattacks continue to devastate businesses and critical operations, putting personal and operational data at risk. Critical operations...
Blog Images (25)
Threat Operators Evade Detection Using Double DDL Sideloading
11 May 2023
An APT threat operating group called “Dragon Breath,” “Golden Eye Dog,” or “APT-Q-27” is displaying a new trend of various complex versions of the basic...
Blog Images (19)
What Stricter Data Privacy Laws Mean for Cybersecurity Policies
10 May 2023
Data privacy is already a significant burden for today’s companies. As modern privacy laws extend to more of the world’s population, regulatory compliance...
Blog Images (28)
Cactus Ransomware Evades Antivirus Through Self-Encryption
09 May 2023
Cactus, a new ransomware operation, has been using vulnerabilities in VPN appliances to get initial access to networks of enterprise organizations. Cactus...
Blog Images (23)
Threat Actors Use More Malicious Email Attachments in Attacks
08 May 2023
Researchers are warning that threat operators are increasingly using more malicious HTML files in their cyberattacks, with malicious files accounting for...
Blog Images (22)
Cybersecurity Attack Halts German IT Service Provider
06 May 2023
Bitmarck, a German IT service provider, has stated that it has taken all its client and internal systems offline because of a cyberattack being discovered....
May 5, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: May 5, 2023
05 May 2023
The cyber threat landscape is increasingly challenging to navigate for entities in all industries and of all sizes. It’s critical to partner with...
Blog Images (18)
Malware Toolkit Discovered After 70 Billion DNS Queries Analyzed
05 May 2023
After reviewing unusual DNS traffic that differed from normal internet activity, a new enterprise-targeting malware toolkit called “Decoy Dog” was uncovered....
Blog Images (17)
New Extortion Tactics Used to Force Ransomware Payments
04 May 2023
The increase in reported ransomware victims in Q1 2023 indicates the continued prevalence of ransomware as a global, industry-agnostic threat. The research...
Blog Images (20)
CISA Warns of Critical Bugs in Illumina DNA Sequencing Systems
03 May 2023
The United States Cybersecurity Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) issued a warning about two vulnerabilities...
Blog Images (16)
Threat Actors Use Data from Resold Routers to Breach Networks
02 May 2023
On the secondary market, enterprise-level network equipment conceals important data that threat operators can use to breach companies’ environments or...
Blog Images (15)
The Importance of Having an Annual Penetration Test
01 May 2023
Companies rely significantly on technology and interconnected systems to preserve their competitive advantage in today’s digital environment. With the...
Blog Images (13)
DDoS Attacks Switching Focus to Targeting VPS Infrastructure
29 April 2023
In the first quarter of 2023, hyper-volumetric distributed denial of service (DDoS) attacks have switched from compromised IoT devices to breached Virtual...
April 28, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: April 28, 2023
28 April 2023
Last month saw a record number of ransomware attacks across the landscape, which does not mean you should expect attacks to taper off. On the contrary,...
Blog Images (12)
LockBit Ransomware Targeting Mac Devices Using Encryptors
27 April 2023
The LockBit ransomware group created its first encryptors that target Apple computers, becoming the first major ransomware operation to specifically target...
Blog Images (9)
How Companies Can Improve Their Cybersecurity Culture
26 April 2023
The need for strong cybersecurity is becoming more evident as companies are moving their operations online. With increasing cyber threats, including breaching,...
Blog Images (14)
Play Ransomware Using Custom Data Theft Tool in Cyberattacks
25 April 2023
The Play ransomware group created two custom tools in .NET, called Grixba and VSS Copying Tool, to boost the efficiency of their cyberattacks. Threat operators...
1 2 3 4 33


The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Weekly Ransomware Wrap-ups details the weekly insights on ransomware groups, new tactics they’re employing, and who they impacted.

View Our Wrap-Ups

Translate »