Under Attack? Breach Response Hotline: Call 833.997.7327 (US/CAN)

RESOURCES

With more than 15 years’ experience in cyber counterintelligence, we have learned to approach cybersecurity differently, and more effectively, than other companies. Browse our case studies, experienced insights, Ask the Expert series and more to see why so many organizations choose us to protect their systems when the worst happens.

Resources
Awareness of Phishing Scams Can Defend Against Cyberattacks
5 Major Cybersecurity Threats MSPs are Facing Going Into 2023
Top Cyberattack Risks Impacting 8 Industries
6 Evolving Ransomware Trends Shaping the Cybersecurity Landscape
Yashma ransomware
New Yashma Ransomware Group Targeting Numerous Countries Speaking English
24 August 2023
In a disconcerting development, an unidentified threat actor has unleashed a fresh variant of the Yashma ransomware, targeting entities across English-speaking...
Mallox Ransomware
Mallox Ransomware Group Escalates Cyber Threat with Enhanced Evasion Tactics
23 August 2023
Mallox Ransomware Group Escalates Cyber Threat with Enhanced Evasion Tactics   Chris Swagler | August 23rd, 2023The notorious Mallox ransomware group...
MoveIt Transfer
MoveIt Transfer Attacks Surged In July: Clop Ransomware Used Zero-Day Exploits
22 August 2023
MoveIt Transfer Attacks Surged In July: Clop Ransomware Used Zero-Day Exploits     Chris Swagler | August 22nd, 2023In the ever-evolving landscape...
Manufacturing Sector
Ransomware's Impact on the Manufacturing Sector: A Multi-Billion Dollar Threat
21 August 2023
Ransomware’s Impact on the Manufacturing Sector: A Multi-Billion Dollar Threat   Chris Swagler | August 21st, 2023The manufacturing sector has become...
Industrial Organizations
Industrial Organizations Targeted By Ransomware Attacks
17 August 2023
Industrial Organizations Targeted By Ransomware Attacks   Chris Swagler | August 17th, 2023The cybersecurity landscape has recently witnessed a dramatic...
WormGPT
WormGPT: A Cybercriminal AI Tool Fueling BEC Scams
17 August 2023
WormGPT: A Cybercriminal AI Tool Fueling BEC Scams   Chris Swagler | August 17th, 2023Recently, cybercriminals have devised a potent weapon in their...
Seven Stages of Ransomware Attacks
Understanding the Seven Stages of Ransomware Attacks
15 August 2023
Understanding the Seven Stages of Ransomware Attacks   Chris Swagler | August 15th, 2023Ransomware attacks have become widespread, targeting organizations...
FTC Safeguards Rule
How Your Business Can Maintain Compliance with the FTC Safeguards Rule
14 August 2023
How Your Business Can Maintain Compliance with the FTC Safeguards Rule   SpearTip | August 14th, 2023Given the steady presence of cyberattacks, governments,...
Mass Password Resets
Proactively Managing Mass Password Resets After a Ransomware Attack
14 August 2023
Proactively Managing Mass Password Resets After a Ransomware Attack   Chris Swagler | August 14th, 2023In an increasingly interconnected world, the...
August-11-2023-Weekly Ransomware Wrap-up
Weekly Ransomware Wrap-Up: August 11, 2023
11 August 2023
Ransomware groups and threat actors continuously target global companies using the MOVEit vulnerability and disrupt other tactics. Here are just some of...
Financial Institutions
Fortifying Financial Institutions: Strengthening Cybersecurity in Today's World
10 August 2023
Fortifying Financial Institutions: Strengthening Cybersecurity in Today’s World   Chris Swagler | August 10th, 2023The digital era has brought immense...
Retail Chain
Data Breach on Retail Chain Exposed Sensitive Information
09 August 2023
Data Breach on Retail Chain Exposed Sensitive Information   Chris Swagler | August 9th, 2023In recent news, Hot Topic, the popular retail chain known...
Air-Gapped Devices
Air-Gapped Devices Vulnerable to New Sophisticated Malware Attacks in Eastern Europe
08 August 2023
The digital landscape has recently witnessed a surge in cyber threats and attacks, with threat operators continuously honing their techniques to exploit...
Web Shells
Web Shells Used in Cyberattacks Targeting Over 600+ Citrix Servers
07 August 2023
Web Shells Used in Cyberattacks Targeting Over 600+ Citrix Servers   Chris Swagler | August 7th, 2023In recent times, a significant number of Citrix...
mattress giant
Mattress Giant Hit with Cyberattack Shutting Down IT Systems
05 August 2023
Mattress Giant Hit with Cyberattack Shutting Down IT Systems   Chris Swagler | August 5th, 2023Mattress giant Tempur Sealy, the renowned mattress...
May 5, 2023 Ransomware Wrap-Up (1)
Weekly Ransomware Wrap-Up: August 4, 2023
04 August 2023
Ransomware groups and threat actors continuously use the MOVEit vulnerability to target significant companies and disrupt companies’ operations....
Healthcare Data Breaches
The Soaring Cost of Healthcare Data Breaches Is Concerning for Providers
03 August 2023
The healthcare industry has been facing a significant rise in data breaches, and the repercussions are becoming more severe than ever before. According...
Abyss Locker
Linux-Targeting Abyss Locker Ransomware Strikes VMware ESXi Servers
02 August 2023
A recent wave of cyberattacks has put VMware ESXi servers at risk as the notorious Abyss Locker ransomware has been specifically adapted to target Linux-based...
new data leak API
AlphV/BlackCat Ransomware Group Added Data Leak API to Enhance Extortion Tactics
01 August 2023
AlphV/BlackCat Ransomware Group Added Data Leak API to Enhance Extortion Tactics   Chris Swagler | August 1st, 2023In recent cybersecurity news,...
Report Cyberattacks
Report Cyberattacks Within 4 Days Now Required by SEC to U.S. Companies
31 July 2023
In a significant move to bolster cybersecurity in the United States, the Securities and Exchange Commission (SEC) has introduced groundbreaking regulations...
1 5 6 7 8 9 40

Categories

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights