Under Attack? Breach Response Hotline: Call


With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Blog Images (73)
BlackByte Ransomware Returns With New Extortion Tactics
22 August 2022
After disappearing for a while, the BlackByte ransomware group returned with a new data leak website and new extortion techniques they borrowed from LockBit....
August 19, 2022 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: August 19, 2022
19 August 2022
The latest installment of Weekly Ransomware Wrap-Up is yet another reminder that threat actors are constantly retooling and searching for organizational...
Blog Images (72)
FBI Warns Zeppelin Ransomware Targeting Healthcare Industries
18 August 2022
As Capitol Hill leaders encourage the Department of Health and Human Services (HHS) to step up its efforts to defend hospitals and public health systems...
Blog Images (69)
Digital Dependencies Can Lead to Increasing Cyber Threats
17 August 2022
Technology is being increasingly used by governments, non-profits, and enterprise businesses to manage everything from public services to business processes...
Blog Images (66)
Be Brilliant with the Cybersecurity Basics
12 August 2022
Threat actors are relentless in their pursuit of your business-critical data and actively seek the path of least resistance to achieve their objectives....
August 12, 2022 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: August 12, 2022
12 August 2022
Over the past week, numerous organizations across multiple industries have felt the impacts of ransomware. Threat actors shut down the network of Quebec-based...
Blog Images (67)
The Importance of Risk Assessments for MSPs and Their Clients
11 August 2022
Threats to cybersecurity come in all shapes and sizes. A seemingly innocent email from a trusted, reliable coworker can hide dangerous viruses and other...
Blog Images (65)
Threat Actors Use New Phishing Tactic Capable of Bypassing MFA
09 August 2022
Using a customized proxy-based phishing kit, a recent large-scale phishing operation is targeting credentials for Microsoft email services to bypass multi-factor...
Blog Images (64)
Businesses Are Often Unprepared to Defend Against Ransomware
08 August 2022
A recent study of forty CISOs revealed that companies are hesitant to directly combat ransomware in their computing systems, and unfortunately, are slower...
August 5, 2022 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: August 5, 2022
05 August 2022
The past week yet again demonstrates ransomware is among the greatest threats facing businesses and nations around the globe. A ransomware attack on a...
Blog Images (63)
Fewer Victims Paid Ransomware Groups in Q2 2022
03 August 2022
In Q2 2022, the battlegrounds between ransomware affiliates and cybersecurity providers have expanded. Ransomware groups such as Black Basta, BlackCat,...
Blog Images (62)
Adopting Cybersecurity Industry Standards Will Protect MSPs’ Clients
01 August 2022
Industry leaders and key stakeholders are urging companies to adopt established cybersecurity standards as Managed Service Providers (MSPs) are becoming...
July 29 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: July 29, 2022
29 July 2022
The Canadian town of St. Marys was severely impacted by ransomware that shut down computer and IT systems while encrypting large swaths of data. Attacks...
Blog Images (61)
Cybersecurity Measures to Assist MSPs In Protecting Their Clients
28 July 2022
Improved internal security practices are necessary given the numerous cyberattacks targeting Managed Service Providers (MSPs). Fortunately, there are many...
Blog Images (68)
Cyber Vulnerabilities Can Severely Impact Global Companies
25 July 2022
Growing cyber threats are exceeding societies’ capacity to properly prevent and manage them given the widespread reliance on complex digital systems. For...
Blog Images (58)
The Importance of Risk Assessments For MSPs and Their Clients
25 July 2022
Threats to cybersecurity come in all shapes and sizes. A seemingly innocent email from a reliable coworker can have dangerous viruses and other malware,...
July 22 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: July 22, 2022
22 July 2022
Ransomware knows no boundaries and spares no industry as the latest ‘Weekly Ransomware Wrap-Up’ demonstrates. Dubai-based Spinneys supermarket...
Blog Images (57)
Holy Ghost Ransomware Connected to North Korean Threat Operators
21 July 2022
North Korean threat operators have been running HolyGhost, a ransomware operation, for more than a year targeting small businesses in numerous countries....
Blog Images (55)
How MSPs Can Survive a Ransomware Attack
20 July 2022
With planning and awareness, it’s feasible to survive ransomware. Ransomware attacks are frequently mischaracterized, leading people to believe that either...
Blog Images (56)
New Lilith Ransomware Appears Claiming Its First Victim
19 July 2022
New ransomware called “Lilith” recently launched its operation and has already posted its first victim on a data leak site designed to facilitate double-extortion...
1 2 3 4 23
Translate »

Total Economic Impact™ Of SpearTip ShadowSpear