Resources
Providing you the latest industry-specific news and insights.
articleRansomware Trends & Data Insights: May 2025
Interlock ransomware group activity spiked in May 2024, using RATs, RDP, and data leak tactics to target sectors like healthcare, tech, and manufacturing.
Read more
articleAnubis Ransomware Adds Destructive Wiper Capability
Anubis ransomware group uses double extortion, file-wiping, and spear-phishing to target sectors globally. Learn how it threatens data security and recovery.
Read more
articleTikTok Videos Lead to Infostealing Malware
Cybercriminals are leveraging TikTok videos infostealers with AI-generated content to spread malware. These campaigns steal credentials via pirated app lures, signaling a growing cyber threat across social platforms.
Read more
articleCoinbase Data Breach Leads to Social Engineering Attacks
The 2025 Coinbase data breach compromised 70,000 user accounts, exposed sensitive data, and triggered a $20M ransom demand alongside widespread phishing threats.
Read more
articleLockBit Ransomware Group Suffers Data Breach
The LockBit ransomware leak 2025 uncovers Bitcoin wallets, ransomware builds, chat logs, and affiliate data, offering deep insight into the group’s tactics.
Read more
articleCybercriminals Spread Fog Ransomware Disguised as DOGE Emails
Cybercriminals use a phishing campaign to spread Fog ransomware, posing as the Department of Government Efficiency (DOGE) to trick users with malicious ZIP files.
Read more
articleBrowser Threats Evolve to Distribute Malware Through OneDrive and Microsoft Teams
Threat actors use a new browser cache smuggling technique to inject malware via OneDrive and Teams, bypassing EDR with DLL proxying and social engineering.
Read more
articleRansomHub Leverages New “Betruger” Backdoor
Betruger is a custom backdoor used in RansomHub ransomware attacks. It streamlines hacking with built-in tools for keylogging, C2 uploads, and privilege escalation.
Read more
articleAI Deep Dive Part 3: Understanding Biases & How Threat Actors Use AI
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more
articleAI Deep Dive Part 2: Data Privacy Concerns
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more
articleSuspected North Korean Actors Pull off the Largest Crypto Heist in History
Bybit suffered a massive $1.4B Ethereum theft in 2025, linked to North Korean hackers. Learn how the attack happened and what it means for crypto security.
Read more
articleSanctions Against Zservers
The US, UK, and Australia sanctioned bulletproof hosting provider Zservers (XHOST) for aiding ransomware groups like LockBit. The Netherlands seized 127 servers. Arete tracks its impact on cybercrime, as law enforcement actions disrupt threat actor o
Read more










