Under Attack? Breach Response Hotline: Call 833.997.7327


With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, expert insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Blog Images (7)
Cybersecurity Experts Warn of Increasing Ransomware in Middle East
02 April 2022
Cybersecurity experts are warning that incidents of ransomware are increasingly becoming the most common cyberattack method against companies, especially...
April 1_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: April 1, 2022
01 April 2022
  Ransomware is no joke, as it continues to devastate businesses, communities, and critical infrastructure all over the world. This chapter of ‘Weekly...
Blog Images (2)
HIVE Ransomware Changes Its Linux VMware ESXi Encryptor to Rust
31 March 2022
The Hive ransomware group converted their VMware ESXi Linux encryptor to the Rust programming language and added new features to make it more difficult...
Blog Images (1)
Continuous Monitoring is Necessary Given Ransomware Encryption Speed
30 March 2022
Researchers conducted a technical experiment in which they tested ten ransomware variants to determine how quickly they encrypt files and how possible...
Blog Images
Digital Forensics Is a Key Service Necessary to Combating Ransomware
29 March 2022
What is Digital Forensics? In the past few decades, the use and study of ‘forensic science’ have become popularized in our lexicon due to the proliferation...
Blog Images (39)
SpearTip's Active Endpoint Monitoring Can Help Grow Your MSP
28 March 2022
MSPs have a strong grasp of technology, but cybersecurity is not often prioritized as their IT teams may be stretched too thin. Outsourcing is a good way...
Blog Images (38)
Analysis of Two Ransomware Attacks from One Affiliate: BlackMatter & BlackCat
26 March 2022
BlackCat is a growing Ransomware-as-a-Service (RaaS) group targeting several worldwide organizations over the past few months. Rumors have surfaced of...
March 25_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: March 25, 2022
25 March 2022
The ransomware landscape is as treacherous as ever, as is demonstrated in this most recent installment of ‘Weekly Ransomware Wrap-Up’. Scroll our resources...
Blog Images (36)
AvosLocker Ransomware Increasingly Targeting US Critical Infrastructure
24 March 2022
The Federal Bureau of Investigation (FBI), in a joint cybersecurity advisory with the United States Treasury Department and the Financial Crimes Enforcement...
it remediation
How IT Remediation Can Help Businesses Restore Their Networks
23 March 2022
What is IT Remediation? Threat actors are constantly changing tactics to immobilize companies with ransomware and take control of valuable and sensitive...
Blog Images (33)
Conti Ransomware Access Broker’s Tactics Exposed
22 March 2022
The operations of a threat actor called “EXOTIC LILY,” an initial access broker with connections to the Conti and Diavol ransomware operations were exposed...
Blog Images (32)
Overcome Alert Fatigue By Prioritizing Your Approach to Cybersecurity
21 March 2022
In today’s digital business world, threat alerts are fundamental to IT security. Are they enough, however, when traditional infrastructure has been eclipsed...
March 18_Weekly Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: March 18, 2022
18 March 2022
The past week continues to demonstrate that ransomware is one of the biggest threats facing businesses and individuals around the globe. In order to enhance...
Blog Images (30)
New Ransomware LokiLocker Combines File Encryption and Data Wiping
17 March 2022
A threat intelligence team discovered a new Ransomware-as-a-Service (RaaS) family and traced its origins to its possible beta stage release. Like other...
Blog Images (29)
How MSP Growth in Cybersecurity Can Be Rewarding for Clients
17 March 2022
It’s a great time to be a Managed Service Provider (MSP), especially with no shortage of demand and various services to offer. IT services are more important...
Blog Images (28)
New Ransomware Group, Pandora, Hits Automotive Giant DENSO
16 March 2022
DENSO, one of the world’s largest automotive parts manufacturers, confirmed that a new Pandora ransomware operation leaked data it allegedly stole during...
Blog Images (24)
Leaked Information Reveals Inner Working of Conti Ransomware Group
15 March 2022
A Ukrainian security specialist turned the tables on the notorious Russia-based ransomware group, Conti, and leaked the group’s source code, chat logs,...
Blog Images (18)
How Strong Client Relationships Support Overall Business Security
14 March 2022
Developing good relationships is essential to any company’s success as connections with customers, clients, vendors, suppliers, and service providers can...
Blog Images (19)
Protect Yourself from Malicious Phishing Attacks Over Social Media
13 March 2022
The latest data suggests there are nearly 4 billion social media users worldwide who engage in various platforms for communication, news, and entertainment....
Blog Images (21)
SpearTip’s 1st Law of Cybersecurity
12 March 2022
There is an axiom in the technology lexicon known as the 1st Law of Cybersecurity: “If there is a vulnerability, it will be exploited. No exceptions.”...
1 2 3 4 5 19

Total Economic Impact™ Of SpearTip ShadowSpear