Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
- article
No Deal Is Worth Identity Theft: Ways to Prepare for Secure Holiday Shopping
By Kevin Baker The holidays are upon us and with them often comes a mad rush to “Act now!” to score the best online deals “before it’s too late!” Unfortunately, competitive, hurried Black Friday-type shopping can translate to distracted shopping,…
Read more - report
Q3 2021 Crimeware Report: For Every Action, There Is an Equal and Opposite Reaction
Cybercrime is in a constant state of evolution and revolution, and threat actors are reacting to the actions of their targets as governments and law enforcement agencies seek to protect those targets.
Read more - article
SIEM vs. XDR: Advances in Security Monitoring and Cyber Defense
The cybersecurity industry is chockfull of jargon, abbreviations, and acronyms. So much so that it can often be difficult to decide which tools may provide the best protection for your company. To help, we’d like to clarify some terms and review the
Read more - article
PYSA: 2020 to Now
BY ARETE CYBER THREAT INTELLIGENCE TEAM PYSA is the newest variant of the Mespinoza Ransomware as a Service (RaaS) family, which was first observed infecting victims in the wild in December 2019. PYSA is likely a reference to the open-source web…
Read more - report
Q2 2021 Crimeware Report: Crime and No Punishment
Like legitimate businesspeople, threat actors are always looking for ways to optimize operations and boost profits. With time and impunity on their side, some started to get more creative in Q2 2021.
Read more - podcast
Beyond the Breach: Data Privacy and Legal Expertise
In this episode of Security Superpowers, join Mullen Coughlin Partner Greg Bautista as he discusses his extensive experience in data privacy and cybersecurity law.
Read more - report
Engineering Consulting Firm Improves Security with a Formalized, Top-down Risk Management Program
Engineering consulting firm improves security with a formalized, top-down risk management program.
Read more - podcast
Beyond the Breach: Data Exfil & Data Mining with Will Hartz
Arete’s Director of Data Breach Analysis Will Hartz joins the podcast to discuss what happens beyond the breach and how Arete helps clients identify and report on sensitive data.
Read more - article
Endpoint Detection and Response: The Closest Thing to a Silver Bullet to Stop Ransomware
By Paul Caron In its recent report “Combating Ransomware,” the Ransomware Task Force says there’s no silver bullet to solving the ransomware challenge. Instead, the group touts a multi-pronged approach and provides an extensive list of…
Read more - article
Teach a Man Not to Be Phished
BY KEVIN BAKER Email phishing scams are rampant. And to help you avoid falling victim to one, I’m offering five easy to-dos. 1. STAY ALERT. When it comes to defeating cybercrime, awareness is step number one. While deceptive emails aren’t the…
Read more - podcast
Cybersecurity Forensic Investigations with Brian Rydstrom
Arete’s Director of Digital Forensics Brian Rydstrom joins the conversation about his time working at a big four consulting firm, leading a team of incident responders, how to leverage threat intelligence, and the importance of information sharing.
Read more - article
Avaddon Ransomware Hits AXA
Avaddon ransomware allegedly attacked European insurance provider AXA shortly after the company announced that it will stop paying ransoms for its clients. Our analysis provides an in-depth look at Avaddon’s tactics and recommended mitigations.
Read more