INSIGHTS

Blog Images (52)
FBI Seized Hive Ransomware Group’s Website and Decryption Keys
28 January 2023
After infiltrating the group’s infrastructure last July, the FBI seized Hive ransomware operation’s Tor payment and data leak websites as part of an international...
Blog Images (47)
Ransomware Payments Dropped 40% in 2022 as More Victims Refuse to Pay
27 January 2023
According to new data, ransomware payments declined by more than 40% in 2022 compared to 2021, with victim companies refusing to pay their extortionists....
Blog Images (48)
The Right Cybersecurity Partner Helps MSPs Against Cyberattacks
25 January 2023
Managed service providers (MSPs) shouldn’t have to spend numerous hours researching, interviewing, and testing cybersecurity vendors to identify the best...
Blog Images (46)
Four Ransomware Groups To Be Aware of in 2023
24 January 2023
Looking forward in 2023, people can learn a lot about ransomware by looking back to 2022. Many of the same ransomware operations cybersecurity companies...
Blog Images (45)
New Ransomware Variants Targeting Windows Systems Appear
23 January 2023
Three more ransomware variants can be added to the ever-growing list of threats security teams need to monitor. Like most ransomware, the three variants,...
January 20, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: January 20, 2023
20 January 2023
The threat landscape continues to devastate businesses in all industries and their customers all over the globe, demonstrating the absolute need to maintain...
Blog Images (44)
Five Cybersecurity Threats in 2023 Companies Need to Know
20 January 2023
If cybersecurity isn’t already a top priority for companies in 2023, it needs to be. As high-profile attacks occurred around the world in 2022, it was...
Blog Images (43)
Business Email Compromises Cost Companies More Than Ransomware
19 January 2023
Over the course of six months, a recently hired administrative assistant for a top law firm from the east coast received three emails from a partner asking...
Blog Images (42)
Ransomware Group Leaks Stolen Data by Cloning Victim Websites
18 January 2023
ALPHV ransomware operators are becoming more brazen with their extortion tactics, which now include creating a duplicate of their victims’ websites and...
Blog Images (36)
The Tenth Man Rule of Cybersecurity
14 January 2023
  It is always the right time to work toward improvement. Whether you’re among the small contingent of Americans still pursuing their New Year’s resolution...
January 13, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: January 13, 2023
13 January 2023
Threat actors continue to devastate the landscape with consistent cyberattacks against entities of all sizes and industries, including government agencies...
Blog Images (40)
Cybersecurity Insights That Will Benefit MSPs in 2023
12 January 2023
The last several years have seen significant changes in how people experience life and run their businesses. As we look forward to this still new year,...
Blog Images (39)
New Exploit, OWASSRF, Targeting Exchange Server Vulnerabilities
11 January 2023
Cybersecurity researchers discovered a new exploit method, OWASSRF, being exploited in the wild. The exploit contains the combination of CVE-2022-41080...
Blog Images (38)
Over 200 Public Entities Impacted by Ransomware in 2022
09 January 2023
In 2022, ransomware attacks impacted over 200 organizations in the United States public sector, including the government, education, and healthcare sectors....
Blog Images (37)
New Attack Vector Targeting Amazon Web Services (AWS)
03 January 2023
Threat researchers discovered a new security threat to a recently added functionality in Amazon Web Services (AWS). The attack vector is related to the...
Blog Images (33)
Awareness of Phishing Scams Can Defend Against Cyberattacks
22 December 2022
SpearTip recently partnered up with Women in Cybersecurity (WiCyS) to present a webinar discussing the importance of phishing training within companies,...
Blog Images (35)
How Companies Can Effectively Manage Clients’ Data
21 December 2022
Having effective customer data management can assist companies in avoiding data breaches and the ensuing chain of issues. Management actions can assist...
Blog Images (34)
Strategies to Mitigate Against Potential Ransomware Attacks
20 December 2022
Managed service providers (MSPs), who are charged with providing IT security services to clients, have found themselves in the sights of ransomware groups....
Blog Images (31)
Key Strategies That Can Help MSPs Defend Against Cyberattacks
15 December 2022
Numerous companies, ranging from small to medium-sized companies to critical infrastructure industries, are relying on Managed Service Providers (MSPs)...
Blog Images (32)
Threat Group Uses Various Deceptive Tactics to Spread Malware
14 December 2022
A new threat group is breaking into networks and encrypting them with file-locking malware before demanding ransom from victims. In September, the Royal...
1 2 3 22
Translate »

Total Economic Impact™ Of SpearTip ShadowSpear