Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
articleRansomware Trends & Data Insights: May 2025
Interlock ransomware group activity spiked in May 2024, using RATs, RDP, and data leak tactics to target sectors like healthcare, tech, and manufacturing.
Read more
articleTikTok Videos Lead to Infostealing Malware
Cybercriminals are leveraging TikTok videos infostealers with AI-generated content to spread malware. These campaigns steal credentials via pirated app lures, signaling a growing cyber threat across social platforms.
Read more
articleCoinbase Data Breach Leads to Social Engineering Attacks
The 2025 Coinbase data breach compromised 70,000 user accounts, exposed sensitive data, and triggered a $20M ransom demand alongside widespread phishing threats.
Read more
articleLockBit Ransomware Group Suffers Data Breach
The LockBit ransomware leak 2025 uncovers Bitcoin wallets, ransomware builds, chat logs, and affiliate data, offering deep insight into the group’s tactics.
Read more
articleCybercriminals Spread Fog Ransomware Disguised as DOGE Emails
Cybercriminals use a phishing campaign to spread Fog ransomware, posing as the Department of Government Efficiency (DOGE) to trick users with malicious ZIP files.
Read more
articleBrowser Threats Evolve to Distribute Malware Through OneDrive and Microsoft Teams
Threat actors use a new browser cache smuggling technique to inject malware via OneDrive and Teams, bypassing EDR with DLL proxying and social engineering.
Read more
articleRansomHub Leverages New “Betruger” Backdoor
Betruger is a custom backdoor used in RansomHub ransomware attacks. It streamlines hacking with built-in tools for keylogging, C2 uploads, and privilege escalation.
Read more
articleAI Deep Dive Part 3: Understanding Biases & How Threat Actors Use AI
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more
report2024 Annual Crimeware Report
Explore Arete’s 2024 Annual Crimeware Report for insights on ransomware trends, ransom demands, targeted industries, and threat lifecycle intelligence.
Read more
articleAI Deep Dive Part 2: Data Privacy Concerns
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more
articleBianLian
BianLian extorts victims with aggressive tactics. Learn about its ransom trends, evolving threats, and the FBI’s findings on recent scam letters.
Read more
articleSuspected North Korean Actors Pull off the Largest Crypto Heist in History
Bybit suffered a massive $1.4B Ethereum theft in 2025, linked to North Korean hackers. Learn how the attack happened and what it means for crypto security.
Read more










