Under Attack? Breach Response Hotline: Call

RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Awareness of Phishing Scams Can Defend Against Cyberattacks
Key Strategies That Can Help MSPs Defend Against Cyberattacks
MSPs Receive Numerous Benefits By Using SOC-as-a-Service
5 Major Cybersecurity Threats MSPs are Facing Going Into 2023
Blog Images (22)
Connections Found Between Karakurt and Two High-Profile Ransomware Groups
20 April 2022
Researchers discovered financial and technological connections between the Karakurt cybercriminal group and two high-profile ransomware actors, Conti and...
Blog Images (21)
OldGremlin Resurfaces With Ransomware Targeting Russian Mining Organization
19 April 2022
A lesser-known threat actor, OldGremlin, which uses its advanced skills to run meticulously planned, sporadic campaigns resurfaced last month after being...
Blog Images (15)
LockBit Ransomware Lurked in U.S. Government Network for Months
18 April 2022
Security researchers discovered the LockBit ransomware that breached a regional United States government agency lurked in the network for five months before...
Untitled design (8)
Critical Vulnerability in Remote Procedure Call Requires Immediate Patch
15 April 2022
Critical Vulnerability Alert During Microsoft’s most recent ‘Patch Tuesday’ announcement, its team shared information about the need to immediately patch...
April 15_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: April 15, 2022
15 April 2022
This newest episode of Weekly Ransomware Wrap-Up reinforces the reality that threat actors are tirelessly seeking ways to access and ransom business-critical...
Blog Images (14)
Pre-Breach Assessments Can Mitigate the Growing Threat of Ransomware
14 April 2022
A new report that surveyed 1200 IT security professionals in 17 countries around the world has shown a dramatic rise in companies willing to pay ransoms...
Blog Images (11)
FBI Warns of Ransomware Attacks Against Healthcare and Local Governments
12 April 2022
The Federal Bureau of Investigation (FBI) issued a warning about ransomware attacks disrupting public services, including utilities, emergency services,...
decryption services
How Decryption Services Can Help Recover Companies' Data
12 April 2022
What is Decryption? In today’s landscape of cyberattacks, a favorite tactic of threat actors is to encrypt data and hold it for ransom using any number...
Blog Images (8)
How To Best Prepare For the Future of Ransomware
11 April 2022
The world of ransomware is constantly evolving. It’s a never-ending cat-and-mouse game in which malicious and deceptive cybercriminals wreak havoc on companies...
Blog Images (12)
Borat Expands RAT Capabilities with Ransomware and DDoS
09 April 2022
Borat, a new remote access trojan (RAT), offers threat actors a menu of cyberattack tactics to choose from. Cybercriminals usually use RATs to gain full...
April 8_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: April 8, 2022
08 April 2022
Today’s installment of ‘Weekly Ransomware Wrap-Up’ is a reminder that threat actors are constantly retooling and searching for organizational security...
Blog Images (10)
Constructing A Roadmap for Borderless Cyber Threats
08 April 2022
The United States Secret Service has a motto that every agent strives to affirm and demonstrate daily: “Worthy of Trust and Confidence”. Whether protecting...
Blog Images (9)
Having a Formal Ransomware Response Plan Is Necessary for Businesses
07 April 2022
According to research from a French multinational company, malware, ransomware, and phishing are plaguing global companies: 21% experienced a ransomware...
Blog Images (5)
Partnering With External Cybersecurity Benefits MSPs and Their Clients
05 April 2022
Having the right cybersecurity measures in place is critical for every Managed Service Provider (MSP) regardless of type or size. Cyberattacks on global...
Blog Images (3)
Break the Ransomware Cycle By Neutralizing Precursor Malware
04 April 2022
Ransomware is among the most feared cyber threats as it puts sensitive data at risk and costs businesses millions of dollars in damages, downtime, and...
Blog Images (7)
Cybersecurity Experts Warn of Increasing Ransomware in Middle East
02 April 2022
Cybersecurity experts are warning that incidents of ransomware are increasingly becoming the most common cyberattack method against companies, especially...
April 1_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: April 1, 2022
01 April 2022
Ransomware is no joke, as it continues to devastate businesses, communities, and critical infrastructure all over the world. This chapter of ‘Weekly...
Blog Images (2)
HIVE Ransomware Changes Its Linux VMware ESXi Encryptor to Rust
31 March 2022
The Hive ransomware group converted their VMware ESXi Linux encryptor to the Rust programming language and added new features to make it more difficult...
Blog Images (1)
Continuous Monitoring is Necessary Given Ransomware Encryption Speed
30 March 2022
Researchers conducted a technical experiment in which they tested ten ransomware variants to determine how quickly they encrypt files and how possible...
Blog Images
Digital Forensics Is a Key Service Necessary to Combating Ransomware
29 March 2022
What is Digital Forensics? In the past few decades, the use and study of ‘forensic science’ have become popularized in our lexicon due to the proliferation...
1 18 19 20 21 22 37

Categories

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Weekly Ransomware Wrap-ups details the weekly insights on ransomware groups, new tactics they’re employing, and who they impacted.

View Our Wrap-Ups