Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
articleNew Vidar Stealer 2.0 Upgrades Infostealer Capabilities
Vidar Stealer 2.0 malware upgrade introduces faster data theft, advanced anti-analysis, and improved credential-stealing techniques.
Read more
articleVelociraptor DFIR Tool Used in Ransomware Attacks
Threat actors exploit outdated Velociraptor DFIR tool versions to deploy ransomware and gain full system control.
Read more
articleOracle Vulnerability Exploited by Cl0p
Cl0p Oracle EBS zero-day exploit leads to data theft via CVE-2025-61882. Oracle issues emergency patch to mitigate remote code execution risk.
Read more
articleSonicWall Discloses Another Breach
SonicWall cloud backup breach exposes encrypted files; users urged to follow remediation guidance to prevent further exploitation.
Read more
articleThreat Actors Turn to Supply Chain Attacks to Push Malware
Discover how malicious npm packages are used in supply chain attacks targeting developers and crypto users, compromising credentials and systems.
Read more
articleMajor Password Managers Vulnerable to Unpatched Clickjacking Flaws
Security researchers reveal unpatched clickjacking vulnerabilities in popular password managers, exposing sensitive data. Users are advised to disable autofill.
Read more
articleRansomware Trends & Data Insights: July 2025
Explore the July 2025 cyber threat landscape, where Akira led ransomware activity, Sinobi emerged, and SharePoint zero-days were exploited by multiple threat groups.
Read more
articleRansomware Trends & Data Insights: June 2025
June 2025 saw Qilin dominate ransomware activity and law enforcement shift focus to cybercrime infrastructure. Discover key trends and group activity insights.
Read more
articleAnubis Ransomware Adds Destructive Wiper Capability
Anubis ransomware group uses double extortion, file-wiping, and spear-phishing to target sectors globally. Learn how it threatens data security and recovery.
Read more
articleTikTok Videos Lead to Infostealing Malware
Cybercriminals are leveraging TikTok videos infostealers with AI-generated content to spread malware. These campaigns steal credentials via pirated app lures, signaling a growing cyber threat across social platforms.
Read more
articleSonicWall VPN Flaws Exploited in the Wild
SonicWall has confirmed active exploitation of two critical SMA100 flaws: CVE-2023-44221 and CVE-2024-38475. Users must patch promptly and review devices for unauthorized access.
Read more
articleCybercriminals Spread Fog Ransomware Disguised as DOGE Emails
Cybercriminals use a phishing campaign to spread Fog ransomware, posing as the Department of Government Efficiency (DOGE) to trick users with malicious ZIP files.
Read more











