INSIGHTS

Blog Images (90)
Threat Actors Evolve Tactics to Bypass MFA
27 September 2022
Threat Actors Evolve Tactics to Bypass MFA   SpearTip | September 27th, 2022The threat tactics are evolving in which malicious actors are using tactics...
Data Security
Add Data Security as a Defense Layer to Limit Theft
26 September 2022
Add Data Security as a Defense Layer to Limit Theft Chris Swagler | September 26th, 2022   Companies with an in-depth defense strategy including data...
September 23, 2022 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: September 23, 2022
23 September 2022
Financial technology company, Revolut, suffered a ransomware attack exposing the personal information of some 50,000 users. As online banking and investing...
Blog Images (88)
Threat Actors Exploit VoIP Phone Systems to Breach Business Networks
20 September 2022
Threat Actors Exploit VoIP Phone Systems to Breach Business Networks   Chris Swagler | September 20th, 2022The Lorenz ransomware group is exploiting...
Cybersecurity Company
Why SpearTip Is An Ideal Cybersecurity Company For MSPs
19 September 2022
Why SpearTip Is An Ideal Cybersecurity Company For MSPs   Chris Swagler | September 19th, 2022 When MSPs are choosing a cybersecurity company that...
September 16, 2022 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: September 16, 2022
16 September 2022
Once again, the landscape demonstrates the need for individuals and businesses to engage proactively against cyber threats. Ransomware operators have been...
Healthcare
The Impact of Ransomware on Healthcare Can Put Patients At Risk
15 September 2022
The Impact of Ransomware on Healthcare Can Put Patients At Risk   Chris Swagler | September 15th, 2022COVID-19 has occupied healthcare providers...
Intermittent Encryption
Threat Actors Expand Use of Intermittent Encryption
14 September 2022
Threat Actors Expand Use of Intermittent Encryption   Chris Swagler | September 14th, 2022Numerous ransomware groups are utilizing a new method,...
Cybersecurity Practices
Foundational Cybersecurity Practices for MSPs and Their Clients
13 September 2022
Foundational Cybersecurity Practices for MSPs and Their Clients     Chris Swagler | September 13th, 2022Managed service providers (MSPs) want...
Human Response
Why Human Response Is a Cybersecurity Imperative
09 September 2022
Why Human Response Is a Cybersecurity Imperative   David White | September 9th, 2022If an organization were to build an optimized cybersecurity posture...
September 9, 2022 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: September 9, 2022
09 September 2022
Savannah College of Art and Design, which serves 15,000+ students, experienced a ransomware attack resulting in the leak of sensitive personal information....
Ransomware Playbook
Lacking A Ransomware Playbook Can Cost Companies Millions
08 September 2022
Lacking A Ransomware Playbook Can Cost Companies Millions   Chris Swagler | September 8th, 2022Ransomware is one type of cyberattack that has the...
Blog Images (80)
Ransomware Operators Elevating Threat Tactics to Triple Extortion
06 September 2022
Ransomware Operators Elevating Threat Tactics to Triple Extortion Chris Swagler | September 6th, 2022   The LockBit ransomware group announced it made...
Blog Images (82)
Go-Based Ransomware Targets Victims with Customized Attacks
03 September 2022
Go-Based Ransomware Targets Victims with Customized Attacks   Chris Swagler | September 3rd, 2022A new Go-Based ransomware variant called “Agenda”...
September 2, 2022 Ransomware Wrap-Up
Weekly Ransomware Wrap-Up: September 2, 2022
02 September 2022
The threat landscape is consistently active with new and re-emerging threat groups, an expanding list of targets, and evolving tactics demonstrating the...
Ransomware-as-a-Service
A Growing Threat On the Cyber Landscape: Ransomware-as-a-Service
31 August 2022
A Growing Threat On the Cyber Landscape: Ransomware-as-a-Service     Chris Swagler | August 31st, 2022Ransomware is a particularly difficult...
LockBit Ransomware
LockBit Ransomware: A Global Cyberthreat
30 August 2022
LockBit Ransomware: A Global Cyberthreat Chris Swagler | August 30th, 2022   In today’s digital world, it’s critical to remain updated on cybersecurity...
Blog Images (78)
Why Threat Actors Are Increasingly Targeting MSPs
30 August 2022
Why Threat Actors Are Increasingly Targeting MSPs   Chris Swagler | August 30th, 2022It’s becoming more important for managed service providers (MSPs)...
Blog Images (77)
Data Exfiltration Is an Increasing Threat to Businesses
29 August 2022
Data Exfiltration Is an Increasing Threat to Businesses Chris Swagler | August 29th, 2022   Over the past few years, ransomware has been the primary threat...
August 19, 2022 Ransomware Wrap-Up (1)
Weekly Ransomware Wrap-Up: August 26, 2022
26 August 2022
This ‘Weekly Ransomware Wrap-Up’ serves as yet another reminder that threat actors are active around the globe searching for opportunities and launching...
1 17 18 19 20 21 38

Categories

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights

The Insights provides information on current and new ransomware groups, advisory from the FBI, and other cybersecurity information.

View All Our Insights

Members of the Executive BoardRoom provide detailed insights on how cybersecurity can help companies protect their data networks.

View Our Executive Boardroom Insights

The ShadowSpear Platform insights demonstrates how our integrable managed detection and response tool defends companies from cyberattacks

View Our Insights

The Managed Service Providers (MSPs) insights provide information on how these companies can defend themselves against cyberattacks.

View Our MSPs Insights