Under Attack? Breach Response Hotline: Call

RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Blog Images (53)
Cybersecurity Challenges Facing MSPs and Their Clients
18 July 2022
Virtually all personal and business data is stored on internet-connected platforms given the growing dependence on technology in everyone’s lives. While...
Blog Images (52)
Why Proactive and Reactive Security Measures Must Co-Exist
15 July 2022
For tens of millions of Americans, the recent 4th of July holiday was an opportunity to relax, gather with friends and family, and celebrate the joys of...
Blog Images (54)
Threat Actors Impersonate Cybersecurity Companies in Phishing Schemes
15 July 2022
In callback phishing emails, threat operators are pretending to be well-known cybersecurity companies like CrowdStrike to gain initial access to corporate...
July 15 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: July 15, 2022
15 July 2022
French communications company, La Poste TELECOM, experienced a LockBit ransomware attack that disrupted its management systems. A new ransomware variant...
Blog Images (50)
Security Tips to Help MSPs Defend Clients Against Cyberattacks
14 July 2022
An enormous global movement toward remote working environments has made it easier for cybercriminals to operate. No company, regardless of size, is safe....
Blog Images (51)
Targeted Malware Attack Impacts IT MSP Service Giant
13 July 2022
A New Jersey-based Information Technology (IT) Managed Service Provider, SHI International, confirmed a cyberattack breached its network. SHI, one of North...
Blog Images (46)
How MSPs Can Keep Clients Informed About Potential Cyber Risks
12 July 2022
Given the complexities of managing numerous cybersecurity tools, Managed Service Providers (MSPs) need to ensure their clients are adapting to stay ahead...
Blog Images (49)
Hive Ransomware Upgrading to Rust To Enhance Encryption Method
11 July 2022
Hive, one of the most destructive Ransomware-as-a-Service (RaaS) operators, is overhauling its file-encryption software to Rust and adopting a more sophisticated...
Blog Images (48)
FBI Issues Warning About Ransomware Exploiting RDP Vulnerabilities
08 July 2022
Numerous US law enforcement agencies have focused their attention on MedusaLocker, a ransomware group that became active during the pandemic by targeting...
July 8 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: July 8, 2022
08 July 2022
Ransomware attacks and malicious threat actors continue to proliferate the cyber landscape. This week’s wrap-up is a reminder to remain alert and...
Blog Images (47)
Why Cybersecurity Shouldn’t Be Your IT Team’s Responsibility
07 July 2022
IT management, passwords, dark web scans, and firewall settings are only a small part of cybersecurity. It’s a full-time, continuous, and important process...
Blog Images (42)
How to Mitigate Ransomware In Remote Work Environments
05 July 2022
Ransomware threats are increasingly challenging for global organizations with the shift to remote and hybrid work. This business shift brought with it...
Blog Images (40)
Ransomware Groups Look to Expand Cyberattacks to Japan
02 July 2022
The Tsurugi Municipal Handa Hospital is a modest facility on the corner of Shikoku Island. It faces a river, backs onto a hill, and serves a local population...
July 1 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: July 1, 2022
01 July 2022
As has always been the case, there is much to report in our latest “Weekly Ransomware Wrap-Up”. LockBit ransomware group launches ‘LockBit...
Blog Images (45)
LockBit Creates Ransomware Bug Bounty Program
01 July 2022
“LockBit 3.0”, the first ransomware bug bounty program, was introduced by the LockBit ransomware operation along with leaking new extortion tactics and...
Blog Images (39)
Why Cybersecurity Needs to Be Top Priority for MSPs
30 June 2022
  With the security landscape constantly changing, a new normal has emerged in terms of cybersecurity and risk mitigation methods. Managed Service...
Blog Images (44)
Chinese Threat Actors Use Ransomware as Decoy for Espionage
29 June 2022
Two Chinese cyber threat groups are deploying a new loader to spread five different ransomware strains as decoys to cover up their malicious activities,...
Blog Images (43)
Conti Ransomware Operation’s Leak and Negotiation Sites Shut Down
28 June 2022
One notorious cybercrime brand’s final chapter has been officially closed with the shutdown of the Conti ransomware operation’s final public-facing infrastructure,...
Blog Images (37)
How Managed Service Providers Can Handle Cyberattacks
27 June 2022
In today’s digital business world, cyberattacks are on the rise and threat actors are targeting everyone with sensitive information for data theft to use...
June 24 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: June 24, 2022
24 June 2022
The latest on the threat landscape demonstrates once again that ransomware is a global problem, as threat operators target organizations wherever an opportunity...
1 2 3 4 5 23
Translate »

Total Economic Impact™ Of SpearTip ShadowSpear