Skip to Main Content

Resources

Providing you the latest industry-specific news and insights.

  • article

    Malware Spotlight: Fog Ransomware

    The Fog ransomware group is one of the few threat actors targeting one industry: education. This spotlight explores the group’s observed behavior, background information on the threat actor, and a technical analysis of Fog’s ransomware executable.

    Read more
  • article

    Ransomware and Cloud Security

    Cloud infrastructures, seen as more secure than on-premise, face risks like cryptominers, DoS attacks, and extortion. Mr. Anazon, a threat actor, exploits these vulnerabilities, highlighting ongoing cloud security challenges.

    Read more
  • article

    Largest Data Breach of All Time (So Far)

    On July 4th, 2024, a threat actor posted nearly ten billion unique passwords to a dark web forum. This was the second large dump of passwords from the threat actor calling themselves ObamaCare on the forum.

    Read more
  • article

    Threat Actor Spotlight: BlackSuit Ransomware

    First observed by Arete in May 2023, BlackSuit ransomware is an emerging cyber threat targeting organizations across several sectors. This spotlight explores the ransomware behavior observed, incident response data, and technical analysis.

    Read more
  • article

    LockBit Claims to Have U.S. Federal Reserve Data 

    On June 25, LockBit claimed to have stolen 33 terabytes of data from the U.S. Federal Reserve. They posted 21 links with data from Evolve Bank & Trust, which was recently penalized for compliance issues.

    Read more
  • article

    Q1 2024 Crimeware Report

    Q1 2024 Crimeware Report uses data from Arete’s ransomware and extortion responses. It covers ransomware variant trends, ransom demands, impacts on infrastructure, and Q2 forecasts.

    Read more
  • article

    Scattered Spider Adapts to Evolving Threat Landscaped

    Delve into the dynamic threat landscape of cybersecurity with a comprehensive analysis of RansomHub and Scattered Spider's evolving tactics in ransomware and data theft. Learn how these groups adapt and pivot in response to disruptions.

    Read more
  • article

    Ransomware Realities: Additional Risks During the Crisis

    After a ransomware attack, restoring data and minimizing business disruption is crucial. It's also vital to address post-incident factors to ensure full recovery and prevent further security issues. Discover key strategies to mitigate threats.

    Read more
  • article

    The Role of Space Systems in the U.S. Cybersecurity Strategy

    The rising frequency and sophistication of cyber threats from state and non-state actors presents significant risk to U.S. national security and commerce.

    Read more
  • article

    Windows Native Ransomware – Encrypting with Bitlocker

    Bitlocker, a Windows app for full-volume encryption, is exploited by threat actors to encrypt files and demand ransom. Despite more advanced options, new actors like "Shrinklocker" still prefer Bitlocker for encryption.

    Read more
  • article

    Avaddon Ransomware Hits AXA

    Avaddon ransomware allegedly attacked European insurance provider AXA shortly after the company announced that it will stop paying ransoms for its clients. Our analysis provides an in-depth look at Avaddon’s tactics and recommended mitigations.

    Read more
  • article

    Colonial Pipeline Breached by Darkside Ransomware Group

    On Saturday May 8, US Colonial Pipeline announced that they were victim of a ransomware attack that affected their network on Friday May 7. US Colonial Pipeline is said to be the largest fuel pipeline in the United States and the main source of…

    Read more