Resources
Providing you the latest industry-specific news and insights.
- All Topics
- Arete Analysis
- At Arete
- Client Stories
- Combating Ransomware
- Cyber Threats
- Cybersecurity 101
- Cybersecurity Trends
- Data Mining
- Data Transfer
- Endpoint Detection and Response
- Forensic Investigations
- Identity Protection
- Managed Services
- Ransomware Technical Analysis
- Recovery
- Security Recommendations
- Threat Actors
- Tips
- Workplace Security
articleManaged File Transfer Exploits: Here to Stay?
Cybercriminals exploit MFT vulnerabilities in CentreStack and GoAnywhere, enabling remote code execution and access to sensitive data.
Read more
articleScattered Spider Claims to be Going Dark
The Scattered Spider cybercrime group announced it was going dark, but evidence suggests ongoing operations.
Read more
articleMultiple Threat Groups Using New EDRKillShifter Builds
Multiple ransomware groups now use updated EDRKillShifter builds to disable EDR protections via BYOVD and HeartCrypt, targeting major security platforms.
Read more
articleAkira Targeting SonicWall Devices (Again)
A recent wave of Akira ransomware attacks has targeted SonicWall firewall devices, exploiting a previously identified flaw.
Read more
articleBianLian
BianLian extorts victims with aggressive tactics. Learn about its ransom trends, evolving threats, and the FBI’s findings on recent scam letters.
Read more
articleSuspected North Korean Actors Pull off the Largest Crypto Heist in History
Bybit suffered a massive $1.4B Ethereum theft in 2025, linked to North Korean hackers. Learn how the attack happened and what it means for crypto security.
Read more
articleSanctions Against Zservers
The US, UK, and Australia sanctioned bulletproof hosting provider Zservers (XHOST) for aiding ransomware groups like LockBit. The Netherlands seized 127 servers. Arete tracks its impact on cybercrime, as law enforcement actions disrupt threat actor o
Read more
articleAWS Falls Victim to Ransomware
Emerging ransomware Codefinger encrypts AWS S3 buckets via SSE-C, targeting cloud data for ransom. Learn about the impact and potential risks of this tactic.
Read more
articleThreat Actors Attempting to Sell Data While Extorting Victims
Discover how cyber threat actors like "wonder" and "M0riarty" monetize stolen data through BreachForums and ransomware tactics.
Read more
articleInterlock: An Emerging Ransomware Threat
An analysis of the Interlock ransomware group, their tactics, and their impact across various industries.
Read more
articleBlack Basta Leverages New Social Engineering Technique
Black Basta, a ransomware group active since at least April 2022, is deploying a new social engineering tactic using Microsoft Teams in an active campaign.
Read more
articleThe Return of Bumblebee Loader
After its disruption in May 2024, Bumblebee is back in the cyber ecosystem, using a new infection chain with LNK, PowerShell, and MSI files to drop additional malware.
Read more











