Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
- report
Arete’s Q1 2025 Crimeware Report
Arete’s Q1 2025 Crimeware Report reveals key cyber threat trends, top threat groups, ransom shifts, and common malware and access methods.
Read more - article
Ransomware Trends & Data Insights: May 2025
Interlock ransomware group activity spiked in May 2024, using RATs, RDP, and data leak tactics to target sectors like healthcare, tech, and manufacturing.
Read more - article
TikTok Videos Lead to Infostealing Malware
Cybercriminals are leveraging TikTok videos infostealers with AI-generated content to spread malware. These campaigns steal credentials via pirated app lures, signaling a growing cyber threat across social platforms.
Read more - article
Coinbase Data Breach Leads to Social Engineering Attacks
The 2025 Coinbase data breach compromised 70,000 user accounts, exposed sensitive data, and triggered a $20M ransom demand alongside widespread phishing threats.
Read more - article
LockBit Ransomware Group Suffers Data Breach
The LockBit ransomware leak 2025 uncovers Bitcoin wallets, ransomware builds, chat logs, and affiliate data, offering deep insight into the group’s tactics.
Read more - article
Cybercriminals Spread Fog Ransomware Disguised as DOGE Emails
Cybercriminals use a phishing campaign to spread Fog ransomware, posing as the Department of Government Efficiency (DOGE) to trick users with malicious ZIP files.
Read more - article
Browser Threats Evolve to Distribute Malware Through OneDrive and Microsoft Teams
Threat actors use a new browser cache smuggling technique to inject malware via OneDrive and Teams, bypassing EDR with DLL proxying and social engineering.
Read more - article
RansomHub Leverages New “Betruger” Backdoor
Betruger is a custom backdoor used in RansomHub ransomware attacks. It streamlines hacking with built-in tools for keylogging, C2 uploads, and privilege escalation.
Read more - article
AI Deep Dive Part 3: Understanding Biases & How Threat Actors Use AI
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more - report
2024 Annual Crimeware Report
Explore Arete’s 2024 Annual Crimeware Report for insights on ransomware trends, ransom demands, targeted industries, and threat lifecycle intelligence.
Read more - article
AI Deep Dive Part 2: Data Privacy Concerns
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more - article
BianLian
BianLian extorts victims with aggressive tactics. Learn about its ransom trends, evolving threats, and the FBI’s findings on recent scam letters.
Read more