Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
- article
Cybersecurity Trends: What We Saw in 2020, What We Expect to See in 2021
Where change seems a constant, perhaps the biggest and most surprising cybersecurity issue of 2020 was a lack of change. But before we get to that, let’s look at some other key cybersecurity trends. A CONTINUED RISE IN RANSOMWARE ATTACKS Kidnapping…
Read more - article
Egregor: The Ghost of Soviet Bears Past Haunts On
Egregor ransomware, a sophisticated RaaS platform, uses data exfiltration and brazen negotiation tactics to target major sectors like manufacturing and retail and caters to experienced affiliates.
Read more - article
The Road Back: Recovery from a Malware Attack in the Long Term
Arete Incident Response is currently answering the call of duty for about 60 companies per month who have experienced malware intrusions. These are mostly ransomware or business email compromise attacks. Arete’s primary goal is to restore what was…
Read more - podcast
Nation State Threats with Jim Jaeger
In this episode, Kevin Smith and Stephen Ramey talk to Arete's chief cyber strategist, Jim Jaeger, about nation state threats, ways to keep your business safe from ransomware, and more!
Read more - article
Universal Encryption
Ransomware variants like Ryuk, WastedLocker, and Dopplepaymer are also file level encryption. These groups will gain access to the network and perform reconnaissance to identify the victim, understand their business, identify critical systems, and…
Read more - article
System Specific Encryption
Ransomware variants like Phobos, Dharma or CryLock are file level encryption. The TA gains access to the system, copies specific encryption executables onto the systems then runs the executables to encrypt the files. The results are files with a new…
Read more - article
Maze Ransomware: Is Posting Data Counterproductive?
In 2020, Maze Ransomware began utilizing both encryption and data exfiltration in an attempt to maximize ransom payments, but these tactics may backfire by adding additional incident response costs for victims.
Read more