Providing you the latest industry-specific news and insights.
SIEM vs. XDR: Advances in Security Monitoring and Cyber Defense
BY RAE JEWELL The cybersecurity industry is chockfull of jargon, abbreviations, and acronyms. So much so that it can often be difficult to decide which tools may provide the best protection for your company. To help, we’d like to clarify some terms…Read more
Dear Ramey: Watering Hole Attacks Explained
ANSWERING BURNING QUESTIONS FROM VICTIMS OF CYBER EVENTS. DEAR RAMEY: I heard this phrase “watering hole attack.” I understand the concept of a phishing email but how is a watering hole attack different? – Safari Sam DEAR SAFARI SAM: Even…Read more
The Hidden Costs of Cybercrime
By Kevin Baker, Director of Cyber Strategy and Defense This year, the global cost of cybercrime is expected to hit $6 trillion.[i] Up from $3 trillion in 2015, it’s nothing short of a big, flourishing business whose operators are relentless…Read more
DasH into the Future of Cybercrime
By Jaycee Roth It is 6:30AM on a Monday morning, you are startled awake by your phone receiving a call. It is Veronica, a long-time employee complaining that she cannot access any of the data on the shared D: drive – a critical drive to the…Read more
Anti-virus or AI driven Endpoint Protection?
Stephen Ramey Arete investigates a lot of ransomware attacks. In fact, 90% of our business is helping organizations big and small, recover from and investigate ransomware attacks. Variants like Maze, Sodinokibi, WastedLocker, Ryuk,…Read more
Ransomware Decryptors for a (varying) fee
Ransomware attacks wreak havoc on business operations. Destroying recovery options, instilling fear and panic, and most often creating high levels of stress for IT staff, owners, and operators. A simple, but often costly fix is to just pay the…Read more
Remote Access and IoT Search Engines
Recently, Arete Incident Response Tiger Teams (“Arete IR”) have responded to an increased volume of ransomware incidents involving the Sodinikibi, Phobos, and Dharma ransomware variants. The threat actors deploying these variants are known to use…Read more