Skip to Main Content

Resources

Providing you the latest industry-specific news and insights.

  • article

    First We Mine, Then We Hack

    A malware campaign disguised as Minecraft mods on GitHub is stealing credentials and crypto wallets. Over 1,500 users are affected. Learn more.

    Read more
  • podcast

    Cyber Campfire: May Threat Trends & Insights

    Cyber Campfire delivers the latest monthly insights from Arete’s Threat Intelligence Team. In this month's episode, our TI team reviews May's cyber threat statistics, highlights key trends, and discusses emerging threat actors. Join the TI team as they provide an in-depth look at the evolving threat landscape and its implications for the cybersecurity community. Tune in every month for informative updates and expert commentary on the latest developments.

    Read more
  • article

    Anubis Ransomware Adds Destructive Wiper Capability

    Anubis ransomware group uses double extortion, file-wiping, and spear-phishing to target sectors globally. Learn how it threatens data security and recovery.

    Read more
  • report

    Arete’s Q1 2025 Crimeware Report

    Arete’s Q1 2025 Crimeware Report reveals key cyber threat trends, top threat groups, ransom shifts, and common malware and access methods.

    Read more
  • article

    Ransomware Trends & Data Insights: May 2025

    Interlock ransomware group activity spiked in May 2024, using RATs, RDP, and data leak tactics to target sectors like healthcare, tech, and manufacturing.

    Read more
  • article

    TikTok Videos Lead to Infostealing Malware

    Cybercriminals are leveraging TikTok videos infostealers with AI-generated content to spread malware. These campaigns steal credentials via pirated app lures, signaling a growing cyber threat across social platforms.

    Read more
  • article

    Coinbase Data Breach Leads to Social Engineering Attacks

    The 2025 Coinbase data breach compromised 70,000 user accounts, exposed sensitive data, and triggered a $20M ransom demand alongside widespread phishing threats.

    Read more
  • article

    LockBit Ransomware Group Suffers Data Breach

    The LockBit ransomware leak 2025 uncovers Bitcoin wallets, ransomware builds, chat logs, and affiliate data, offering deep insight into the group’s tactics.

    Read more
  • article

    Cybercriminals Spread Fog Ransomware Disguised as DOGE Emails

    Cybercriminals use a phishing campaign to spread Fog ransomware, posing as the Department of Government Efficiency (DOGE) to trick users with malicious ZIP files.

    Read more
  • article

    Browser Threats Evolve to Distribute Malware Through OneDrive and Microsoft Teams

    Threat actors use a new browser cache smuggling technique to inject malware via OneDrive and Teams, bypassing EDR with DLL proxying and social engineering.

    Read more
  • article

    RansomHub Leverages New “Betruger” Backdoor

    Betruger is a custom backdoor used in RansomHub ransomware attacks. It streamlines hacking with built-in tools for keylogging, C2 uploads, and privilege escalation.

    Read more
  • article

    AI Deep Dive Part 3: Understanding Biases & How Threat Actors Use AI

    Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.

    Read more