Why Alert Volume Matters: Cutting Through the Noise
Making Sense of MITRE Evaluations The MITRE Engenuity ATT&CK Evaluations serve as a ...
ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again
Imagine a ransomware attack that's so old-school it's using VBScript and a built-in Windows ...
5 Approaches to Counter a Cybercriminal’s Growing Arsenal
Cybercriminals are advancing at a relentless pace, arming themselves with adaptable tools ...
Meow, Meow Leaks, and the Chaos of Ransomware Attribution
Meow has captivated the attention of cybersecurity and threat intelligence teams as a threat ...
Understanding the Roles in the Ransomware-as-a-Service Ecosystem: Who’s Targeting Your Data Security Gaps
Ransomware-as-a-service (RaaS) has surged in recent years, becoming a dominant model for ...
The Importance of People in Cyber Risk Management: Incident Response Tabletop Exercises (TTX)
Imagine waking up to find your organization’s data plastered across the dark web. The ...
Top Ransomware Trends for 2024-2025 Security Teams Can't Ignore
As ransomware tactics evolve, staying ahead of emerging threats has never been more crucial ...
A Comprehensive Look at the Evolution of the Cybercriminal Underground
The early days of hacker groups and lone wolf threat actors look much different compared to ...
Beyond Technical Offensive Security: 4 Tips for Implementing a Holistic Approach to Managing Cyber Risk
Cybersecurity assessments are an integral part of an organization’s security strategy, ...
Our Software Release Strategy
Following recent cybersecurity events, we’ve seen a significant increase in inquiries from ...
Breaking Down the Intersection of AI and Cybersecurity
In the world of cybersecurity, staying ahead of emerging threats is paramount. Florin ...
Phishing in the C-Suite: Protecting Executives from Targeted Cyber Attacks
Whether they are experienced or novices, today’s threat actors have a choice to make. They ...