In the News

SonicWall Vulnerabilities

SonicWall, specializing in network security, access security, cloud security, and endpoint security, has nearly 800,000 internet-accessible virtual public network (VPN) […]

Read More

Cybersecurity Awareness Month Top Tips

If it is connected, it must be protected. Because if you don’t, cybercriminals will find it, probe open services, and […]

Read More

Tyler Technologies Ransomware Attack Raises Cyber Election Concerns

Software provider Tyler Technologies recently fell victim to a ransomware attack whose impact goes beyond the malicious encryption of one […]

Read More

Garmin Attack Further Challenges Boundaries of Ransomware Payments

News of the WastedLocker Ransomware attack on Garmin, the GPS and aviation specialist, continues to spread. According to reports, Garmin […]

Read More

Ransomware Demands Increased but Attacks Decreased

Ransomware recovery experts, Coveware put out an excellent report regarding ransomware over Q2 2020. The average payment for a ransomware […]

Read More

North Korea’s New Ransomware

North Korea continues to be a cybersecurity threat to U.S. based companies. This is what we know so far: How: […]

Read More

Netflix & Scam

Have you received an email from Netflix Support? Double check it. It could be a phishing scam. There is a […]

Read More

Here Kitty Kitty

Who: Meow What: A cyberattack that destroys data without any explanation When: Recently Where: Attacked Elasticsearch and MongoDB (the two […]

Read More

Email Takeover Increasing

Business email compromise (BEC) and phishing attacks are occurring daily. According to helpnetsecurity.com, there is a 200% increase in the […]

Read More

1/10 of Ransomware Attacks Include Data Exfiltration

Automated ransomware data exfiltration has passed 10% of all submitted ransomware files. This is a major shift from less than […]

Read More

Okay, Google – Can You Help Me Build Ransomware?

According to BleepingComputer.com, a Google employee created an encryption tool called AgeLocker to encrypt files. This tool was recently used […]

Read More

Another New Variant: Can Your Security Keep Up?

The latest ransomware on the block dubbed Conti takes advantage of Windows Restart Manager to shut down applications locking files. […]

Read More

Dark Web Has Your Credentials

A recent report was released revealing 15 billion stolen credentials found by. The Digital Shadows Photon Research team has spent […]

Read More

Red, White and BlueLeaks

Private police department files were leaked on June 19 because a Texas web design hosting company, Netsential, who obtains numerous […]

Read More

Bank of America: The Rise of PPP Fraud

Bank of America uploaded PPP (Paycheck Protection Program) loan applications to a test platform, which may have been visible to […]

Read More

Don’t pay the ransom! – How ProLock shows a ransom payment needs expert analysis

ProLock, a new ransomware strain is hitting companies this week for large six figure payouts in multiple industries working similar […]

Read More

Office 365’s new email security protection

Microsoft wants to help your organization’s IT staff. Its new Office 365 features allows for your IT staff to detect […]

Read More

Malware on your smartphone

You spend more time on your phone than on your computer. If you don’t think this is true, check your […]

Read More

500 GB of Microsoft’s GitHub data stolen

Microsoft purchased GitHub in 2018, a software development platform that houses hosting software to approximately 40 million developers. The cybercriminal […]

Read More

Cybersecurity Crisis Management During the Coronavirus Pandemic

Cyber criminals thrive on chaos, making cybersecurity crisis management vital. Jarrett Kolthoff, SpearTip CEO provides insight to IoT World Today […]

Read More

Cyber Criminals Exploiting Searches for Coronavirus Info

Jonathan Tock explains the online trends SpearTip is seeing cyber criminals during this time. Please be extra mindful of what […]

Read More

Working from Home Means Greater Cyber Risk

Listen to Jonathan Tock’s interview with KMOX News about what you need to do to ensure your company’s information stays […]

Read More

6 Security Metrics That Matter – and 4 That Don’t

Check out CSO Online’s new article about which cybersecurity metrics are important and which don’t matter. In it, Jarrett Kolthoff, […]

Read More

Sound Data Privacy Policy Can Drive Market Differentiation

Data breaches are becoming increasingly severe and there is an increased responsibility for companies to handle consumer data in the […]

Read More

Chinese Leverage Private Data Breaches for Espionage

SpearTip was featured in Advisen Ltd.’s Front Page News CyberRisk edition bringing to light China’s goal of leveraging private data […]

Read More

Reducing the Risk of a Cyber Crisis

Life support equipment can be reprogrammed or terminated, resulting in patient deaths. Once cyber criminals have accessed a health care […]

Read More