Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
- article
SonicWall VPN Flaws Exploited in the Wild
SonicWall has confirmed active exploitation of two critical SMA100 flaws: CVE-2023-44221 and CVE-2024-38475. Users must patch promptly and review devices for unauthorized access.
Read more - article
Cybercriminals Spread Fog Ransomware Disguised as DOGE Emails
Cybercriminals use a phishing campaign to spread Fog ransomware, posing as the Department of Government Efficiency (DOGE) to trick users with malicious ZIP files.
Read more - article
Active Exploitation of File Transfer Vulnerabilities
Two major vulnerabilities in CrushFTP and Triofox are under active attack, enabling data exfiltration and extortion. Learn how to patch CVE-2025-31161 and CVE-2025-30406 to protect your organization
Read more - article
Browser Threats Evolve to Distribute Malware Through OneDrive and Microsoft Teams
Threat actors use a new browser cache smuggling technique to inject malware via OneDrive and Teams, bypassing EDR with DLL proxying and social engineering.
Read more - article
AI Deep Dive Part 1: The History of AI
Explore the history of AI, from Alan Turing’s pioneering work to modern innovations like ChatGPT. Learn about key milestones, AI booms, winters, and the future of artificial intelligence in this deep dive into AI’s evolution.
Read more - article
XWorm RAT Builder Targets Script Kiddies
A trojanized XWorm RAT builder targets new hackers, infecting over 18,000 devices worldwide and stealing credentials via Telegram, YouTube, and GitHub.
Read more - article
AWS Falls Victim to Ransomware
Emerging ransomware Codefinger encrypts AWS S3 buckets via SSE-C, targeting cloud data for ransom. Learn about the impact and potential risks of this tactic.
Read more - article
Over 390,000 Credentials Stolen via Malicious GitHub Repository
Year-long trojanized supply chain attack targets pros and thieves, stealing credentials and installing cryptominers.
Read more - article
Chinese Threat Actor Activity Drives US Government Recommendation for Encrypted Communications
FBI and CISA urge encrypted mobile use after Salt Typhoon cyberattacks target U.S. telecom providers for espionage.
Read more - article
Threat Actors Exploiting New ESXi Vulnerability
Explore the critical need to secure your network from VMware ESXi vulnerabilities, such as CVE-2024-37085, exploited by ransomware groups. Learn best practices to protect your virtual environment and prevent unauthorized access.
Read more - article
Ransomware and Cloud Security
Cloud infrastructures, seen as more secure than on-premise, face risks like cryptominers, DoS attacks, and extortion. Mr. Anazon, a threat actor, exploits these vulnerabilities, highlighting ongoing cloud security challenges.
Read more - article
Largest Data Breach of All Time (So Far)
On July 4th, 2024, a threat actor posted nearly ten billion unique passwords to a dark web forum. This was the second large dump of passwords from the threat actor calling themselves ObamaCare on the forum.
Read more