INSIGHTS

Cyberattacks
7 Common Cyberattacks and How To Prevent Them
28 May 2023
7 Common Cyberattacks and How To Prevent Them   Chris Swagler | May 28th, 2023The United States has been battered by a rising number of cyberattacks...
Global Ransomware
Efforts in Preventing Global Ransomware By Governments and Industries Paying Off
27 May 2023
Efforts in Preventing Global Ransomware By Governments and Industries Paying Off   Chris Swagler | May 27th, 2023Even though it may appear contradictory...
May 26, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: May 26, 2023
26 May 2023
Threat actors are hitting the landscape with consistent cyberattacks against entities of all sizes and industries. Here are just some of the cyber incidents...
Ransom Payments
Threat Actors Develop New Tactics To Increase Ransom Payments
25 May 2023
Threat Actors Develop New Tactics To Increase Ransom Payments   Chris Swagler | May 25th, 2023Ransomware continues to be one of the most serious...
Info-Stealing Malware
New Info-Stealing Malware Operations You Need to Know
24 May 2023
New Info-Stealing Malware Operations You Need to Know     Chris Swagler | May 24th, 2023Numerous malware operations are competing for cybercriminal...
Bl00dy Ransomware
Bl00dy Ransomware Group Using PaperCut Bug to Target Education Orgs
23 May 2023
Bl00dy Ransomware Group Using PaperCut Bug to Target Education Orgs   Chris Swagler | May 23rd, 2023According to a joint advisory issued by the FBI...
Insider Threats
How Companies Can Defend Against Insider Threats
22 May 2023
How Companies Can Defend Against Insider Threats   Chris Swagler | May 22nd, 2023 Business owners put a lot of time, effort, and money into growing...
Cybersecurity Risk
6 Key Strategies to Mitigate Cybersecurity Risk
20 May 2023
It takes security teams an average of 277 days to identify and mitigate a data breach. With a single cyberattack that can cost United States companies...
May 19, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: May 19, 2023
19 May 2023
Recently published reports, as well as the threat intelligence from SpearTip’s 24/7 Security Operations Center, indicate cyberattacks, including...
Akira Ransomware
New Akira Ransomware Group Targeting Global Enterprises
18 May 2023
A new ransomware group, Akira, is quietly amassing a victim list as it breaches global companies’ networks, encrypts files, and demands million-dollar...
TBK DVR Devices
5-Year-Old Vulnerability in TBK DVR Devices Exploited
17 May 2023
An unpatched 2018 authentication bypass vulnerability in exposed TBK DVR (digital video recording) devices is being actively exploited by threat operators....
Five Eyes Nations
Five Eyes Nations Face Growing Ransomware Threat
16 May 2023
Five Eyes Nations Face Growing Ransomware Threat   Chris Swagler | May 16th, 2023Ransomware is the most severe threat to Five Eyes nations, and it’s...
ReconShark tool
North Korean Threat Group Finds Security Gaps with ReconShark Tool
15 May 2023
North Korean Threat Group Finds Security Gaps with ReconShark Tool     Chris Swagler | May 15th, 2023The North Korean Kimsuky operating group...
DDoS Botnet
New DDoS Botnet Malware Exploiting Critical RCE Ruckus Flaw
13 May 2023
New DDoS Botnet Malware Exploiting Critical RCE Ruckus Flaw Chris Swagler | May 13th, 2023“AndoryuBot,” a new DDoS Botnet malware, is attempting to infect...
May 12, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: May 12, 2023
12 May 2023
Ransomware and various cyberattacks continue to devastate businesses and critical operations, putting personal and operational data at risk. Critical operations...
DLL Sideloading
Threat Operators Evade Detection Using Double DLL Sideloading
11 May 2023
Threat Operators Evade Detection Using Double DLL Sideloading   Chris Swagler | May 11th, 2023An APT threat operating group called “Dragon Breath,”...
Data Privacy
What Stricter Data Privacy Laws Mean for Cybersecurity Policies
10 May 2023
What Stricter Data Privacy Laws Mean for Cybersecurity Policies   Chris Swagler | May 10th, 2023Data privacy is already a significant burden for...
Cactus Ransomware
Cactus Ransomware Evades Antivirus Through Self-Encryption
09 May 2023
Cactus Ransomware Evades Antivirus Through Self-Encryption   Chris Swagler | May 9th, 2023The new Cactus ransomware operation has been using vulnerabilities...
Malicious HTML
Threat Actors Use More Malicious HTML Attachments in Attacks
08 May 2023
Threat Actors Use More Malicious HTML Attachments in Attacks   Chris Swagler | May 8th, 2023Researchers are warning that threat operators are increasingly...
IT Service Provider
Cyberattack Halts German IT Service Provider
06 May 2023
Cyberattack Halts German IT Service Provider   Chris Swagler | May 6th, 2023Bitmarck, a German IT service provider, has stated that it has taken...
1 8 9 10 11 12 38

Categories

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights