Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
Q3 2024 Crimeware Report
Explore Arete’s Q3 2024 Crimeware Report for insights on ransomware trends, ransom demands, targeted industries, and threat lifecycle intelligence.
Read more- article
Over 390,000 Credentials Stolen via Malicious GitHub Repository
Year-long trojanized supply chain attack targets pros and thieves, stealing credentials and installing cryptominers.
Read more - article
Chinese Threat Actor Activity Drives US Government Recommendation for Encrypted Communications
FBI and CISA urge encrypted mobile use after Salt Typhoon cyberattacks target U.S. telecom providers for espionage.
Read more - article
Managed Detection and Response: A Cornerstone of a Multi-Pronged Approach to Security
The barrier of entry into cybercrime has become significantly lower in recent years, with artificial intelligence, leaked source code, and Cybercrime-as-a-Service tools enabling even less experienced threat actors to execute damaging attacks.
Read more - article
Threat Actors Attempting to Sell Data While Extorting Victims
Discover how cyber threat actors like "wonder" and "M0riarty" monetize stolen data through BreachForums and ransomware tactics.
Read more - report
Q3 2024 Crimeware Report
Explore Arete’s Q3 2024 Crimeware Report for insights on ransomware trends, ransom demands, targeted industries, and threat lifecycle intelligence.
Read more - article
Interlock: An Emerging Ransomware Threat
An analysis of the Interlock ransomware group, their tactics, and their impact across various industries.
Read more - article
Malware Spotlight: Akira Ransomware
Arete has responded to over one hundred incidents attributed to the Akira ransomware group. This spotlight explores Akira’s observed behavior, statistics from Incident Response engagements, and a technical analysis of Akira’s ransomware executable.
Read more - article
Black Basta Leverages New Social Engineering Technique
Black Basta, a ransomware group active since at least April 2022, is deploying a new social engineering tactic using Microsoft Teams in an active campaign.
Read more - article
The Return of Bumblebee Loader
After its disruption in May 2024, Bumblebee is back in the cyber ecosystem, using a new infection chain with LNK, PowerShell, and MSI files to drop additional malware.
Read more - article
Red Team Tool Used to Disrupt Endpoint Security Solutions
Researchers observed criminals using the red-team tool EDRSilencer in cyberattacks. This open-source tool, designed for penetration testing, can detect EDR processes and monitor, modify, or block their outbound network communications.
Read more - article
Recent Sanctions Reveal LockBit and Evil Corp Links
The US Department of the Treasury’s Office of Foreign Assets Control sanctioned seven individuals for their association with the Evil Corp cybercriminal group.
Read more - podcast
Cracking Down on Cybercrime: Law Enforcement Actions and Evolving Methods
In this episode of Bytes of Insight, hosts Vinny Sakore and Evgueni Erchov explore recent law enforcement actions against cybercriminals, the evolution of methods used to pressure cybercriminals, and the value of collaboration with cybersecurity organizations. The discussion highlights key trends Arete has observed across the threat landscape, with insights drawn from our H1 2024 Crimeware Report.
Read more