• March 11, 2022
    In collaboration with the Cybersecurity Program of OAS/CICTE, we examine the cybersecurity challenges affecting member states of the OAS. These issues include ransomware and active attacks, threats related to remote work, and the risks brought about by the adoption of new technologies.
  • February 22, 2022
    We take a closer look at the operations of Clop, a prolific ransomware family that has gained notoriety for its high-profile attacks. We review this ransomware group’s constantly changing schemes and discuss how companies can shore up defenses against this threat.
  • February 08, 2022
    The LockBit intrusion set, tracked by Trend Micro as Water Selkie, has one of the most active ransomware operations today. With LockBit’s strong malware capabilities and affiliate program, organizations should keep abreast of its machinations to effectively spot risks and defend against attacks.
  • January 28, 2022
    This latest report features the ransomware threat landscape in the fourth quarter of 2021, and includes notable ransomware families and the types of industries and enterprises that were targeted. This report also highlights two modern ransomware families that worked overtime during this period, Conti and LockBit.
  • December 20, 2021
    Now that the reign of REvil has come to an end, it's time to regroup and strategize. What can organizations learn from REvil’s tactics? We review the rise, downfall, and future of its operations using insights into the group's arsenal and inner inner workings.
  • December 07, 2021
    In 2022, decision-makers will have to contend with threats old and new bearing down on the increasingly interconnected and perimeterless environments that define the postpandemic workplace.
  • December 01, 2021
    Assumed to be the successor of the Ryuk ransomware, Conti is currently one of the most notorious active ransomware families used in high-profile attacks. Know all about this ransomware family and protect your company against this threat.
  • November 30, 2021
    We examine an emerging business model that involves access brokers selling direct access to organizations and stolen credentials to other malicious actors.
  • November 23, 2021
    This latest report examines the landscape of ransomware families, both legacy and more modern threats, in the third quarter of 2021. Our tracking and investigation covered the families themselves and the types of industries and enterprises that were targeted.