Skip to Main Content

Resources

Providing you the latest industry-specific news and insights.

  • article

    Conti Ransomware is the New Ryuk?

    Based on forensic analysis, Arete’s Threat Intelligence team observed that Conti ransomware could be a rebrand of Ryuk ransomware, as both variants have similar tactics, including leveraging the TrickBot banking trojan to deploy ransomware.

    Read more
  • article

    Coinbase Data Breach Leads to Social Engineering Attacks

    The 2025 Coinbase data breach compromised 70,000 user accounts, exposed sensitive data, and triggered a $20M ransom demand alongside widespread phishing threats.

    Read more
  • article

    TikTok Videos Lead to Infostealing Malware

    Cybercriminals are leveraging TikTok videos infostealers with AI-generated content to spread malware. These campaigns steal credentials via pirated app lures, signaling a growing cyber threat across social platforms.

    Read more
  • article

    Ransomware Trends & Data Insights: May 2025

    Interlock ransomware group activity spiked in May 2024, using RATs, RDP, and data leak tactics to target sectors like healthcare, tech, and manufacturing.

    Read more
  • article

    Anubis Ransomware Adds Destructive Wiper Capability

    Anubis ransomware group uses double extortion, file-wiping, and spear-phishing to target sectors globally. Learn how it threatens data security and recovery.

    Read more
  • article

    First We Mine, Then We Hack

    A malware campaign disguised as Minecraft mods on GitHub is stealing credentials and crypto wallets. Over 1,500 users are affected. Learn more.

    Read more
  • article

    Ransomware Trends & Data Insights: June 2025

    June 2025 saw Qilin dominate ransomware activity and law enforcement shift focus to cybercrime infrastructure. Discover key trends and group activity insights.

    Read more
  • article

    Google Gemini Flaw Hijacks Email Summaries for Phishing

    Google Gemini email summary flaw lets attackers hide malicious instructions in emails, leading users to phishing sites without clicking links.

    Read more