INSIGHTS

Cybercrimes
Top 5 Cybercrimes To Be Aware of in 2023
15 February 2023
Top 5 Cybercrimes To Be Aware of in 2023   Chris Swagler | February 15th, 2023Cybersecurity experts are warning that the threat landscape will bring...
Intermittent Encryption
Proactive Measures Can Protect Against Intermittent Encryption
14 February 2023
Proactive Measures Can Protect Against Intermittent Encryption Chris Swagler | February 14th, 2023   Threat operators continue to exhibit their cunning...
DDoS-as-a-Service
New DDoS-as-a-Service Platform Targeting Hospitals
13 February 2023
New DDoS-as-a-Service Platform Targeting Hospitals   Chris Swagler | February 13th, 2023Pro-Russian threat operators have employed a new DDoS-as-a-Service...
Cybersecurity Monitoring
The Value of Outsourcing Cybersecurity Monitoring
11 February 2023
The Value of Outsourcing Cybersecurity Monitoring   Joe Hoosech | February 11th, 2023To thrive in a competitive market, particularly when economic...
February 10, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: February 10, 2023
10 February 2023
During this past week, we saw cyberattacks, including ransomware, devastate businesses and put individuals at risk with the immense amount of stolen and...
Phishing
QakNote Malware Being Distributed Through OneNote Phishing Campaign
09 February 2023
QakNote Malware Being Distributed Through OneNote Phishing Campaign SpearTip | February 9th, 2023   SpearTip’s Security Operations Center (SOC) team detected...
Malware
Emerging Malware Breached Global Redis Servers
09 February 2023
Emerging Malware Breached Global Redis Servers   Chris Swagler | February 9th, 2023A new stealthy malware designed to search for vulnerable global...
Cyberattacks
10 Strategic Moves To Build A Defense Against Cyberattacks
08 February 2023
10 Strategic Moves To Build A Defense Against Cyberattacks   Chris Swagler | February 8th, 2023Threat analysts and incident responders spend a lot...
Blog Images (59)
Nevada Ransomware Targets Windows and VMware ESXi systems
07 February 2023
Nevada Ransomware Targets Windows and VMware ESXi systems Chris Swagler | February 7th, 2023   Nevada, a relatively new ransomware operation, is rapidly...
Threat Vectors
The Top 5 Threat Vectors Confronting Businesses
06 February 2023
The Top 5 Threat Vectors Confronting Businesses   Chris Swagler | February 6th, 2023In recent years, high-profile cyberattacks have ranged from one...
Proactive Measures
Engage Proactive Measures To Prepare for Cybersecurity Incidents
04 February 2023
Engage Proactive Measures To Prepare for Cybersecurity Incidents   Chris Swagler | February 4th, 2023With ransomware attacks continuing to evolve...
February 3, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: February, 3 2023
03 February 2023
During the first month of 2023, we’ve seen a plethora of cyberattacks targeting businesses of all sizes, in all industries, all over the world....
Blog Images (54)
New Mimic Ransomware Uses “Everything” Windows Tool to Encrypt Files
03 February 2023
New Mimic Ransomware Uses “Everything” Windows Tool to Encrypt Files   Chris Swagler | February 3rd, 2023The new Mimic ransomware searches for files...
RMM Software
Threat Actors Using RMM Software To Target Federal Agencies
02 February 2023
Threat Actors Using RMM Software To Target Federal Agencies   Chris Swagler | February 2nd, 2023Phishing attacks are being used by threat actors...
Phishing Attack
Phishing Attack on Baltimore School District
01 February 2023
Phishing Attack on Baltimore School District   Chris Swagler | February 1st, 2023The Maryland Office of the Inspector General for Education issued...
Google Ads
Ransomware Groups Breaching Networks Using Google Ads
31 January 2023
Ransomware Groups Breaching Networks Using Google Ads   Chris Swagler | January 31st, 2023DEV-0569 is a threat actor using Google Ads in widespread,...
Microsoft-Signed Drivers
Threat Groups Use Microsoft-Signed Drivers to Breach Systems
30 January 2023
After Microsoft-Signed Drivers through their profiles were utilized in cyberattacks, including ransomware incidents, Microsoft revoked numerous of its...
Hive Ransomware
FBI Seized Hive Ransomware Group’s Website and Decryption Keys
28 January 2023
FBI Seized Hive Ransomware Group’s Website and Decryption Keys   Chris Swagler | January 28th, 2023After infiltrating the group’s infrastructure...
January 27, 2023 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: January 27, 2023
27 January 2023
Ransomware attacks and malicious threat actors continue to proliferate the cyber landscape. This week’s wrap-up is a reminder to remain alert and vigilant. Threat...
Ransomware Payments
Ransomware Payments Dropped 40% in 2022 as More Victims Refuse to Pay
27 January 2023
Ransomware Payments Dropped 40% in 2022 as More Victims Refuse to Pay   Chris Swagler | January 27th, 2023According to new data, ransomware payments...
1 13 14 15 16 17 38

Categories

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights