Why Alert Volume Matters: Cutting Through the Noise

Making Sense of MITRE Evaluations The MITRE Engenuity ATT&CK Evaluations serve as a ...

ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again

Imagine a ransomware attack that's so old-school it's using VBScript and a built-in Windows ...

5 Approaches to Counter a Cybercriminal’s Growing Arsenal

Cybercriminals are advancing at a relentless pace, arming themselves with adaptable tools ...

Meow, Meow Leaks, and the Chaos of Ransomware Attribution

Meow has captivated the attention of cybersecurity and threat intelligence teams as a threat ...

The Importance of People in Cyber Risk Management: Incident Response Tabletop Exercises (TTX)

Imagine waking up to find your organization’s data plastered across the dark web. The ...

Top Ransomware Trends for 2024-2025 Security Teams Can't Ignore

As ransomware tactics evolve, staying ahead of emerging threats has never been more crucial ...

A Comprehensive Look at the Evolution of the Cybercriminal Underground

The early days of hacker groups and lone wolf threat actors look much different compared to ...

Beyond Technical Offensive Security: 4 Tips for Implementing a Holistic Approach to Managing Cyber Risk

Cybersecurity assessments are an integral part of an organization’s security strategy, ...

Our Software Release Strategy

Following recent cybersecurity events, we’ve seen a significant increase in inquiries from ...

Breaking Down the Intersection of AI and Cybersecurity

In the world of cybersecurity, staying ahead of emerging threats is paramount. Florin ...

Phishing in the C-Suite: Protecting Executives from Targeted Cyber Attacks

Whether they are experienced or novices, today’s threat actors have a choice to make. They ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW