Ransomware Annual Report 2024

2024 annual ransomware report

The long awaited annual ransomware report, shedding light on statistics, trends, emerging groups, leading groups and more.

Continue reading
emerging threat actor tactics

From Transparency to Coercion, Emerging Threat Actor Tactics

Marked shifts in threat actor tactics are evidence of a brazen growth in confidence among…
Learn more
UK Phishing Attacks on the Rise

UK Phishing Report: Attacks Are on the Rise

The data about the rise of phishing attacks against businesses in the United Kingdom is…
Learn more
finding and analyzing ransomware groups in 2023

Finding and Analyzing Ransomware Groups in 2023: A Guide

In this blog our research team detail how they discover new ransomware groups, what they…
Learn more
The MSSP Buyer Guide to Threat Intelligence and EASM Services

The MSSP Buyer Guide to Threat Intelligence and EASM Services 

What do MSSPs stand to gain by using a Threat Intelligence Solution and what to…
Learn more
Phishing Takedowns

Why Phishing Takedowns Can Be Hard, and How to Simplify Them

Phishing Takedowns are more challenging than many think – speed, language and volume are often…
Learn more
Securing Voice Authentication in the Deepfake Era

Securing Voice Authentication in the Deepfake Era 

Deepfake technology using AI algorithms can now generate realistic voice deepfakes. We outline current vulnerabilities…
Learn more
Barbie Phishing Scams

Phishing Alert: Don’t Fall for Barbie Movie Scams

Unravel the Dark Side of Barbie Movie Mania! Threat Actors exploit the frenzy, using phishing…
Learn more
How Threat Intelligence Drives Efficiency in an Economic Downturn

How Threat Intelligence Drives Efficiency in an Economic Downturn

Increased scrutiny of security & tighter budgets mean cyber strategies need a revamp. See how…
Learn more
Compromised Credentials: Tactics, Risks, Mitigation

Compromised Credentials: Tactics, Risks, Mitigation

The theft of users' credentials is a growing industry. In this blog we cover their…
Learn more
Malvertising: How Phishing Campaigns Use Malicious Ads

Malvertising: How Phishing Campaigns Use Malicious Ads

In the blog we cover the latest malvertising tactics and 4 key ways to combat…
Learn more
Supply Chain Intelligence Can't Be Static: Here's Why

Supply Chain Intelligence Can’t Be Static: Here’s Why

Traditional Supply Chain Intelligence has it's weaknesses including the fact that it is static, misses…
Learn more
Protect from Phishing Attacks

Five Steps to Protect Your Organization against Phishing Attacks

Staying ahead of cybercriminals requires proactive and strategic security measures
Learn more

Discover the True Meaning of Impactful Intelligence

Get a Demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start