Skip to Main Content

Resources

Providing you the latest industry-specific news and insights.

  • article

    AKO Ransomware – Analysis

    Dive into AKO ransomware's methods and impact, including its unique data encryption and extortion techniques. This analysis provides an in-depth look at AKO’s rise and the challenges it presents for organizations and security professionals.

    Read more
  • podcast

    Election Security with Jim Jaeger

    Kevin Smith speaks with president and co-founder of Arete, Jim Jaeger about the upcoming 2020 U.S. Elections, the risks we face, and answers the biggest question of all: Just how safe and accurate is this election going to be?

    Read more
  • podcast

    What It Takes to Start a Career in Cyber Security and the Evolution of Future Cyber Crime

    Featuring Mike Lotas, global incident response leader in SOC at Arete, this episode explores what it takes to start a career in cybersecurity, the evolution and future of cyber crime, and a dive into Mike’s history and career path.

    Read more
  • podcast

    Anatomy of an Incident Response

    Listen as we dive in to the many facets of an incident response to give you insight into the characteristics of a typical IR victim, IR planning, importance of strong passwords, the key to successful forensics and more!

    Read more
  • podcast

    Nation State Threats with Jim Jaeger

    In this episode, Kevin Smith and Stephen Ramey talk to Arete's chief cyber strategist, Jim Jaeger, about nation state threats, ways to keep your business safe from ransomware, and more!

    Read more
  • podcast

    Threat Intelligence with Evgueni Erchov, Part 2

    In this episode, Evgueni Erchov continues the discussion on Threat Intelligence; techniques, emerging threats, and our commitment to partner with law enforcement agencies to help gain a better understanding of the diverse threat actor environment.

    Read more
  • podcast

    Threat Intelligence with Evgueni Erchov Part 1

    In this episode, we interview Arete’s Head of Security Research and Strategy Evgueni Erchov about the most critical weapons used in cyber defense, which attackers target organizations, and how to thwart these attacks. 

    Read more
  • article

    Conti Ransomware is the New Ryuk?

    Based on forensic analysis, Arete’s Threat Intelligence team observed that Conti ransomware could be a rebrand of Ryuk ransomware, as both variants have similar tactics, including leveraging the TrickBot banking trojan to deploy ransomware.

    Read more
  • podcast

    Remote Working Cyber Risks

    Tune in to this week's episode as we sit down with Arete’s Director of Incident Response to delve into the cyber risks associated with remote work.

    Read more
  • article

    Universal Encryption

    Ransomware variants like Ryuk, WastedLocker, and Dopplepaymer are also file level encryption. These groups will gain access to the network and perform reconnaissance to identify the victim, understand their business, identify critical sys­tems, and…

    Read more
  • article

    System Specific Encryption

    Ransomware variants like Phobos, Dharma or CryLock are file level encryption. The TA gains access to the system, copies specific encryption executables onto the systems then runs the executables to encrypt the files. The results are files with a new…

    Read more
  • article

    Remote Access and IoT Search Engines

    Recently, Arete Incident Response Tiger Teams (“Arete IR”) have responded to an increased volume of ransomware incidents involving the Sodinikibi, Phobos, and Dharma ransomware variants. The threat actors deploying these variants are known to use…

    Read more