Under Attack? Breach Response Hotline: Call 833.997.7327 (US/CAN)

RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, experienced insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Resources
Awareness of Phishing Scams Can Defend Against Cyberattacks
5 Major Cybersecurity Threats MSPs are Facing Going Into 2023
Top Cyberattack Risks Impacting 8 Industries
6 Evolving Ransomware Trends Shaping the Cybersecurity Landscape
Blog Images (21)
SpearTip’s 1st Law of Cybersecurity
12 March 2022
SpearTip’s 1st Law of Cybersecurity   Ben Auton | March 12th, 2022There is an axiom in the technology lexicon known as the 1st Law of Cybersecurity:...
ransomware wrap-up
Weekly Ransomware Wrap-Up: March 11, 2022
11 March 2022
The global ransomware threat landscape continues to devastate companies around the world. Fortunately, SpearTip is here to report on the latest attacks...
Weekly Business Article (19)
Newly Discovered Nokoyawa Ransomware Possibly Connected to Hive
11 March 2022
Newly Discovered Nokoyawa Ransomware Possibly Connected to Hive   Chris Swagler | March 11th, 2022Recently, it was discovered that relatively unknown...
Weekly Business Article (17)
Maintaining an Optimal Cybersecurity Posture in An Unpredictable Global Threat Landscape
10 March 2022
Maintaining an Optimal Cybersecurity Posture in An Unpredictable Global Threat Landscape   Christopher Eaton | March 10th, 2022Our current global...
Blog Images (22)
SpearTip's Jonathan Tock Featured on KMOX Radio
10 March 2022
 SpearTip’s Jonathan Tock Featured on KMOX Radio     Christopher Eaton | March 10th, 2022 (The story and interview begin at 01:03) SpearTip...
Blog Images (20)
Ransomware Group Ragnar Locker Actively Targeting Critical Infrastructure
10 March 2022
Ransomware Group Ragnar Locker Actively Targeting Critical Infrastructure Chris Swagler | March 10th, 2022   The United States Federal Bureau of Investigation...
Blog Images (17)
How the IRS Is Aiming to Prevent Ransomware
09 March 2022
How the IRS Is Aiming to Prevent Ransomware Chris Swagler | March 9th, 2022   When it comes to combating the scourge of ransomware attacks plaguing schools,...
data breach investigation
How Data Breach Investigations Help Companies Recover Data
08 March 2022
How Data Breach Investigations Help Companies Recover Data   Chris Swagler | March 8th, 2022 What Is Data Breach Investigation? A data breach is...
Blog Images (16)
Recovery Tips for Preventing Business Disaster From Ransomware
07 March 2022
Recovery Tips for Preventing Business Disaster From Ransomware   Chris Swagler | March 7th, 2022In 2021, ransomware evolved from a new attack vector...
March 4_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: March 4, 2022
04 March 2022
SpearTip discovered a new Conti ransomware attack method utilizing Log4j vulnerabilities to infiltrate networks. The SpearTip team neutralized the attack...
Blog Images (14)
New Conti Ransomware Attack Method Utilizing Log4j to Infiltrate Networks
02 March 2022
New Conti Ransomware Attack Method Utilizing Log4j to Infiltrate Networks   SpearTip | March 2nd, 2022Based on SpearTip Threat Intelligence gained...
Blog Images (15)
CISA Advisory Overview on Russian Cyber Threat
02 March 2022
CISA Advisory Overview on Russian Cyber Threat   Chris Swagler | March 2nd, 2022The Cybersecurity and Infrastructure Security Agency (CISA) issued...
Blog Images (9)
3 Steps to Improve Your Security Posture and Cyber Insurance Coverage
01 March 2022
3 Steps to Improve Your Security Posture and Cyber Insurance Coverage   Christopher Eaton | March 1st, 2022In today’s treacherous threat landscape,...
Blog Images (8)
Why Having a SIEM Solution Is Important for Cybersecurity
01 March 2022
Why Having a SIEM Solution Is Important for Cybersecurity   Chris Swagler | March 1st, 2022SIEM solution or Security information and event management...
Data
Increase Recurring Revenue By Securing Client Data
28 February 2022
Increase Recurring Revenue By Securing Client Data   Chris Swagler | February 28th, 2022Uptime and productivity are vitally important to businesses,...
Feb 25_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: February 25, 2022
25 February 2022
Freight Forwarding and Logistic Company, Expeditors International, Suffers Global Outage Following Targeted Ransomware Attack  Seattle-based Expeditors...
Blog Images (2)
Virtual Meeting Platforms Increasingly Used to Facilitate BEC Scams
24 February 2022
Virtual Meeting Platforms Increasingly Used to Facilitate BEC Scams   Chris Swagler | February 24th, 2022The United States Federal Bureau of Investigation...
Hive Ransomware
Flaw in Hive Ransomware Encryption Algorithm Used as Master Key
23 February 2022
Flaw in Hive Ransomware Encryption Algorithm Used as Master Key   Chris Swagler | February 23rd, 2022Researchers have described the ‘first successful...
Multifactor Authentication
Enable Multifactor Authentication to Protect Against Attacks
22 February 2022
Enable Multifactor Authentication to Protect Against Attacks   Christopher Eaton | February 22nd, 2022When it comes to securing sensitive information—including...
Blog Images (20)
New Warning for Critical Infrastructure Providers of Surge in Ransomware
22 February 2022
New Warning for Critical Infrastructure Providers of Surge in Ransomware Chris Swagler | February 22nd, 2022   Cybersecurity authorities from around the...
1 24 25 26 27 28 39

Categories

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights