Our Insights
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Dear Ramey
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Recovery
- Security Recommendations
- Social Media
- Threat Actors
- Tips
- Workplace Security
- podcast
Election Security with Jim Jaeger
Kevin Smith speaks with president and co-founder of Arete, Jim Jaeger about the upcoming 2020 U.S. Elections, the risks we face, and answers the biggest question of all: Just how safe and accurate is this election going to be?
Read more - podcast
What It Takes to Start a Career in Cyber Security and the Evolution of Future Cyber Crime with Mike Lotas
Featuring Mike Lotas, global incident response leader in SOC at Arete, this episode explores what it takes to start a career in cybersecurity, the evolution and future of cyber crime, and a dive into Mike’s history and career path.
Read more - podcast
Anatomy of an Incident Response with Stephen Ramey
Kevin, Marc, and Steve dive in to the many facets of an incident response to give you insight into the characteristics of a typical IR victim, IR planning, importance of strong passwords, the key to successful forensics and more!
Read more - podcast
Nation State Threats with Jim Jaeger
In this episode, Kevin Smith and Stephen Ramey talk to Arete's chief cyber strategist, Jim Jaeger, about nation state threats, ways to keep your business safe from ransomware, and more!
Read more - podcast
Threat Intelligence, with Evgueni Erchov and Stephen Ramey, Part 2
Kevin Smith, Marc Belicher, Evgueni Erchov, and Stephen Ramey to continue their discussion on Threat Intelligence.
Read more - podcast
Threat Intelligence with Evgueni Erchov Part 1
Kevin Smith and Marc Bleicher interview Arete Director, IR & Cyber Threat Intelligence Evgueni Erchov about the most critical weapons used in cyber defense, which attackers are targeting organizations, and how to thwart these attacks.
Read more - article
Conti Ransomware is the New Ryuk?
BACKGROUND Based on analysis of Conti ransomware, which was originally spotted in the wild in February of this year, the Arete Threat Intelligence team believes that this variant is being operated by the same group that conducted Ryuk…
Read more - podcast
Remote Working Cyber Risks with Stephen Ramey
In this weeks episode Kevin and Marc interview Arete director of incident response Stephen Ramey about the increase in cyber risk due to remote working, Stephen’s observations from the front lines, and his recommendations for preventing an attack!
Read more - article
Universal Encryption
Ransomware variants like Ryuk, WastedLocker, and Dopplepaymer are also file level encryption. These groups will gain access to the network and perform reconnaissance to identify the victim, understand their business, identify critical systems, and…
Read more - article
System Specific Encryption
Ransomware variants like Phobos, Dharma or CryLock are file level encryption. The TA gains access to the system, copies specific encryption executables onto the systems then runs the executables to encrypt the files. The results are files with a new…
Read more - article
Remote Access and IoT Search Engines
Recently, Arete Incident Response Tiger Teams (“Arete IR”) have responded to an increased volume of ransomware incidents involving the Sodinikibi, Phobos, and Dharma ransomware variants. The threat actors deploying these variants are known to use…
Read more - article
Monero- Overview & Quick Facts
OVERVIEW Recently, the threat group behind Sodinokibi ransomware publicly announced the switch from Bitcoin to accepting only Monero payments. The switch was motivated largely by the fact that Monero is inherently more difficult for law…
Read more