Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
podcastWhat Really Happens Behind The Scenes Of A Data Breach?
In this episode of Bytes of Insight, guest host Lynn Peachey, Regional Sales Vice President of Insurance at Arete, sits down with Kamran Salour, Co-Chair of Data Privacy and Cybersecurity of Lewis Brisbois, and Jenna Rooney, Director of Client Services of Arete, to unpack the real-world challenges of data mining, from regulatory compliance to AI-driven efficiencies. Tune in to hear how early collaboration can reduce costs, improve defensibility, and strengthen cyber response.
Read more
articleManaged File Transfer Exploits: Here to Stay?
Cybercriminals exploit MFT vulnerabilities in CentreStack and GoAnywhere, enabling remote code execution and access to sensitive data.
Read more
articleRansomware Trends & Data Insights: September 2025
Akira ransomware dominated August activity, with Qilin second. Arete analysts identified key cybercrime trends behind these threat actors.
Read more
reportArete’s H1 2025 Crimeware Report
Arete's H1 2025 Crimeware Report reveals key ransomware threats, tactics, and trends impacting insurers, brokers, law firms, and insureds, based on real-world incident data.
Read more
podcastCyber Campfire: July Threat Trends & Insights
Explore the July 2025 cyber threat landscape, where Akira led ransomware activity, Sinobi emerged, and SharePoint zero-days were exploited by multiple threat groups.
Read more
articleRansomware Trends & Data Insights: August 2025
Akira led ransomware attacks in August, followed by Qilin. Arete analysts uncovered trends including SonicWall exploits, supply chain breaches, and crypto exchange sanctions.
Read more
articleUS Sanctions Grinex Crypto Exchange
The US Treasury sanctioned Grinex, a crypto exchange built by Garantex insiders to evade sanctions and launder illicit funds, marking a major step in disrupting ransomware financing.
Read more
articleMultiple Threat Groups Using New EDRKillShifter Builds
Multiple ransomware groups now use updated EDRKillShifter builds to disable EDR protections via BYOVD and HeartCrypt, targeting major security platforms.
Read more
articleAkira Targeting SonicWall Devices (Again)
A recent wave of Akira ransomware attacks has targeted SonicWall firewall devices, exploiting a previously identified flaw.
Read more
articleRansomware Trends & Data Insights: July 2025
Explore the July 2025 cyber threat landscape, where Akira led ransomware activity, Sinobi emerged, and SharePoint zero-days were exploited by multiple threat groups.
Read more
articleGoogle Gemini Flaw Hijacks Email Summaries for Phishing
Google Gemini email summary flaw lets attackers hide malicious instructions in emails, leading users to phishing sites without clicking links.
Read more
articleRansomware Trends & Data Insights: June 2025
June 2025 saw Qilin dominate ransomware activity and law enforcement shift focus to cybercrime infrastructure. Discover key trends and group activity insights.
Read more











