Under Attack? Breach Response Hotline: Call

INSIGHTS

Blog Images (88)
Threat Actors Exploit Phone Systems to Breach Business Networks
20 September 2022
The Lorenz ransomware group is exploiting a critical vulnerability in Mitel’s MiVoice VoIP appliance to breach companies using their phone systems for...
Blog Images (85)
Why SpearTip Is An Ideal Cybersecurity Partner For MSPs
19 September 2022
In the past five years, 60% of companies have experienced a cyberattack that financially damaged their business. 52% of small and medium-sized businesses...
Blog Images (87)
The Impact of Ransomware on Healthcare Can Put Patients At Risk
15 September 2022
COVID-19 has occupied healthcare providers for the last few years, given the devastating impact the pandemic had on patients. However, ransomware is another...
Blog Images (86)
Threat Actors Expand Use of Intermittent Encryption
14 September 2022
Numerous ransomware groups are utilizing a new method that increases the encryption process on victims’ systems while decreasing the likelihood of being...
Blog Images (84)
Foundational Cybersecurity Practices for MSPs and Their Clients
13 September 2022
Managed service providers (MSPs) want to provide their clients with the best services, including maintaining their data security and updating their systems....
Blog Images (81)
Why Human Response Is a Cybersecurity Imperative
09 September 2022
If an organization were to build an optimized cybersecurity posture from scratch, its priority should be to retain an experienced, well-trained, and curious...
Blog Images (83)
Lacking A Ransomware Playbook Can Cost Companies Millions
08 September 2022
Ransomware is one type of cyberattack that has the power to drain the color from security leaders’ faces. Recovering from devastating, disruptive, and...
Blog Images (80)
Ransomware Operators Elevating Threat Tactics to Triple Extortion
06 September 2022
The LockBit ransomware group announced it made improvements on its defenses against distributed denial-of-service (DDoS) attacks and looking to elevate...
Blog Images (82)
Go-Based Ransomware Targets Victims with Customized Attacks
03 September 2022
A new ransomware variant called “Agenda” has been discovered written in the Go programming language and customized to maximize impact against individual...
Blog Images (76)
A Growing Threat On the Cyber Landscape: Ransomware-as-a-Service
31 August 2022
Ransomware is a particularly difficult cyber threat to eradicate. It continues to evolve and the most recent versions are extremely dangerous for companies...
Blog Images (79)
LockBit Ransomware: A Global Cyberthreat
30 August 2022
In today’s digital world, it’s critical to remain updated on cybersecurity threats and how dangerous ransomware has become. Ransomware is a major cyber...
Blog Images (78)
Why Threat Actors Are Increasingly Targeting MSPs
30 August 2022
It’s becoming more important for managed service providers (MSPs) to maintain a robust security posture as more companies outsource their IT and data workloads....
Blog Images (77)
Data Exfiltration Is an Increasing Threat to Businesses
29 August 2022
Over the past few years, ransomware has been the primary threat that companies have had to defend against. Threat actors were profiting quickly by taking...
Blog Images (74)
Examining the Main Factors Behind Ransomware Attacks
24 August 2022
Ransomware attacks continue to rule the news headlines with groups, including Lapsus$ and Conti, constantly appearing in alarming stories. Cybersecurity...
Blog Images (70)
Prepare for the Long-Term Effects of Today's Cyber Threats
23 August 2022
Frequently cited cases of previous cyber intrusion are worth revisiting because they show how damaging attacks on sizable and strategically important systems,...
Blog Images (73)
BlackByte Ransomware Returns With New Extortion Tactics
22 August 2022
After disappearing for a while, the BlackByte ransomware group returned with a new data leak website and new extortion techniques they borrowed from LockBit....
Blog Images (72)
FBI Warns Zeppelin Ransomware Targeting Healthcare Industries
18 August 2022
As Capitol Hill leaders encourage the Department of Health and Human Services (HHS) to step up its efforts to defend hospitals and public health systems...
Blog Images (69)
Digital Dependencies Can Lead to Increasing Cyber Threats
17 August 2022
Technology is being increasingly used by governments, non-profits, and enterprise businesses to manage everything from public services to business processes...
Blog Images (66)
Be Brilliant with the Cybersecurity Basics
12 August 2022
Threat actors are relentless in their pursuit of your business-critical data and actively seek the path of least resistance to achieve their objectives....
Blog Images (67)
The Importance of Risk Assessments for MSPs and Their Clients
11 August 2022
Threats to cybersecurity come in all shapes and sizes. A seemingly innocent email from a trusted, reliable coworker can hide dangerous viruses and other...
1 2 3 19
Translate »

Total Economic Impact™ Of SpearTip ShadowSpear