Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
- article
Active Exploitation of File Transfer Vulnerabilities
Two major vulnerabilities in CrushFTP and Triofox are under active attack, enabling data exfiltration and extortion. Learn how to patch CVE-2025-31161 and CVE-2025-30406 to protect your organization
Read more - article
Browser Threats Evolve to Distribute Malware Through OneDrive and Microsoft Teams
Threat actors use a new browser cache smuggling technique to inject malware via OneDrive and Teams, bypassing EDR with DLL proxying and social engineering.
Read more - article
AI Deep Dive Part 1: The History of AI
Explore the history of AI, from Alan Turing’s pioneering work to modern innovations like ChatGPT. Learn about key milestones, AI booms, winters, and the future of artificial intelligence in this deep dive into AI’s evolution.
Read more - article
XWorm RAT Builder Targets Script Kiddies
A trojanized XWorm RAT builder targets new hackers, infecting over 18,000 devices worldwide and stealing credentials via Telegram, YouTube, and GitHub.
Read more - article
AWS Falls Victim to Ransomware
Emerging ransomware Codefinger encrypts AWS S3 buckets via SSE-C, targeting cloud data for ransom. Learn about the impact and potential risks of this tactic.
Read more - article
Over 390,000 Credentials Stolen via Malicious GitHub Repository
Year-long trojanized supply chain attack targets pros and thieves, stealing credentials and installing cryptominers.
Read more - article
Chinese Threat Actor Activity Drives US Government Recommendation for Encrypted Communications
FBI and CISA urge encrypted mobile use after Salt Typhoon cyberattacks target U.S. telecom providers for espionage.
Read more - article
Threat Actors Exploiting New ESXi Vulnerability
Explore the critical need to secure your network from VMware ESXi vulnerabilities, such as CVE-2024-37085, exploited by ransomware groups. Learn best practices to protect your virtual environment and prevent unauthorized access.
Read more - article
Ransomware and Cloud Security
Cloud infrastructures, seen as more secure than on-premise, face risks like cryptominers, DoS attacks, and extortion. Mr. Anazon, a threat actor, exploits these vulnerabilities, highlighting ongoing cloud security challenges.
Read more - article
Largest Data Breach of All Time (So Far)
On July 4th, 2024, a threat actor posted nearly ten billion unique passwords to a dark web forum. This was the second large dump of passwords from the threat actor calling themselves ObamaCare on the forum.
Read more - article
Threat Actor Spotlight: BlackSuit Ransomware
First observed by Arete in May 2023, BlackSuit ransomware is an emerging cyber threat targeting organizations across several sectors. This spotlight explores the ransomware behavior observed, incident response data, and technical analysis.
Read more - article
ALPHV/BlackCat Disruption: Operations Resume
Despite law enforcement’s disruption to ALPHV/BlackCat’s infrastructure in December 2023, the group has since resumed operations.
Read more