Threat Spotlight

Threat Spotlight: Data Extortion Ransomware Threats
Over the last few years, the ransomware landscape has changed significantly. Between 2022 and 2023, ransomware attacks increased by more than 100% year-over-year, with more attacks consisting of double and triple extortion ...

Threat Spotlight: New Frontier of AI Exploits
As machine learning (ML) and artificial intelligence (AI) become increasingly complex, they pose new possibilities for organizations and threat actors. Over the last fifteen years, neural networks and deep learning technologies have ...

Threat Spotlight: New Frontier of AI Exploits
As machine learning (ML) and artificial intelligence (AI) become increasingly complex, they pose new possibilities for organizations and threat actors. Over the last fifteen years, neural networks and deep learning technologies have ...

Threat Spotlight: Data Extortion Ransomware: Key Trends in 2023
Ransomware Trends Overview As ransomware’s fundamental nature shifts from encryption to data exfiltration, organizations’ data backup and recovery practices no longer protect them from attacks. Over the course of the past few ...

Threat Spotlight: Data Extortion Ransomware: Key Trends in 2023
Ransomware Trends Overview As ransomware’s fundamental nature shifts from encryption to data exfiltration, organizations’ data backup and recovery practices no longer protect them from attacks. Over the course of the past few ...

Threat Spotlight: Initial Access Brokers on Russian Hacking Forums
Russian Hacking Forum Trends Initial access brokers (IAB) are sophisticated, focused, and specialized threat actors that focus on finding and gaining access to corporate environments. Once they compromise these environments, they auction ...

Threat Spotlight: The Dark Web and AI
Executive Overview More than 200,000 credentials to AI language models are currently being sold on the dark web as part of stealer logs, files containing thousands of credentials derived from infostealer malware ...

Threat Spotlight: Stealer Logs & Corporate Access
Executive Overview Over the last three years, infostealer malware variants have become a “popular trend” in the cybercriminal Malware-as-a-Service (MaaS) ecosystem. Doing precisely as their category implies, these malware variants steal information ...

Threat Spotlight: Incident Response & Cybercrime in 2023
Executive Summary As the threat environment rapidly changes (and threat actors’ tactics along with it), what should cyber practitioners be on the lookout for? Former Federal Bureau of Investigation (FBI) Deputy Director ...

Threat Spotlight: “Legal” Cybercrime Activities
Executive Overview We often generalize threat actors as the “attackers” and cyber practitioners as the “defenders.” This simplification can work for many purposes, but what if we’re missing key relationships because of ...