Resources
Providing you the latest industry-specific news and insights.
articleBrowser Threats Evolve to Distribute Malware Through OneDrive and Microsoft Teams
Threat actors use a new browser cache smuggling technique to inject malware via OneDrive and Teams, bypassing EDR with DLL proxying and social engineering.
Read more
articleRansomware Trends & Data Insights: March 2025
March 2025 threat analysis reveals Akira-led ransomware trends and new SimpleHelp software flaws. Explore CVE alerts and patch info to stay secure.
Read more
articleRansomHub Leverages New “Betruger” Backdoor
Betruger is a custom backdoor used in RansomHub ransomware attacks. It streamlines hacking with built-in tools for keylogging, C2 uploads, and privilege escalation.
Read more
articleAI Deep Dive Part 3: Understanding Biases & How Threat Actors Use AI
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more
articleAI Deep Dive Part 2: Data Privacy Concerns
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more
articleBianLian
BianLian extorts victims with aggressive tactics. Learn about its ransom trends, evolving threats, and the FBI’s findings on recent scam letters.
Read more
articleSuspected North Korean Actors Pull off the Largest Crypto Heist in History
Bybit suffered a massive $1.4B Ethereum theft in 2025, linked to North Korean hackers. Learn how the attack happened and what it means for crypto security.
Read more
articleSanctions Against Zservers
The US, UK, and Australia sanctioned bulletproof hosting provider Zservers (XHOST) for aiding ransomware groups like LockBit. The Netherlands seized 127 servers. Arete tracks its impact on cybercrime, as law enforcement actions disrupt threat actor o
Read more
articleAI Deep Dive Part 1: The History of AI
Explore the history of AI, from Alan Turing’s pioneering work to modern innovations like ChatGPT. Learn about key milestones, AI booms, winters, and the future of artificial intelligence in this deep dive into AI’s evolution.
Read more
articleXWorm RAT Builder Targets Script Kiddies
A trojanized XWorm RAT builder targets new hackers, infecting over 18,000 devices worldwide and stealing credentials via Telegram, YouTube, and GitHub.
Read more
articleAWS Falls Victim to Ransomware
Emerging ransomware Codefinger encrypts AWS S3 buckets via SSE-C, targeting cloud data for ransom. Learn about the impact and potential risks of this tactic.
Read more
articleMalware Spotlight: RansomHub Ransomware
Arete has responded to dozens of incidents attributed to the RansomHub threat actor group. This spotlight explores RansomHub’s observed behavior, statistics from Incident Response engagements, and a technical analysis of RansomHub’s ransomware execut
Read more









