Blog
![](/sites/default/files/styles/resource_image/public/2021-09/woman_on_phone_pink.jpg?itok=HJUYiAVD)
Email attackers are increasingly using customized phishing campaigns to target users. Read more about these highly targeted attacks here.
Read more![](/sites/default/files/styles/resource_image/public/2021-09/mouse_tangled_wire.jpg?itok=2B1KQfCW)
Ransomware actors use double encryption to complicate the recovery process for victims so they will be more inclined to pay. Read to learn more about it here.
Read more![](/sites/default/files/styles/resource_image/public/2021-09/ups1.png?itok=Vpdx1ee0)
Phishers used a cross-site scripting (XSS) flaw in the UPS website to distribute malware using email subject line “UPS Delivery Exception: Action Required”.
Read more![](/sites/default/files/styles/resource_image/public/2021-09/playbook.jpg?itok=shSejZTC)
Organizations need to be prepared to defend against ransomware. But what does “ransomware defense” mean and how does it look in practice? One word: prevention.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/demonware_1.jpg?itok=5tWzB7RP)
Malicious actors used emails carrying executable (.EXE) file attachments to target recipients with Demonware ransomware.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/man_cheering_work.jpg?itok=bRQTFkf7)
Data backups are a top security measure used for ransomware attack recovery, but having a robust data backup strategy is just as important. Here are some tips.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/piggy_bank_image.jpg?itok=IfyoRJBk)
Phishers leveraged emails with the subject line “Payment Slip” to target unsuspecting users with samples of the Oski infostealer to steal bank data.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/bitcoin_thumb.jpg?itok=iBqu46po)
Knowing the common origins of new ransomware strains can help organizations defend their networks. From state-sponsored to RaaS, three origins are worth noting.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/fishhook_lock.jpg?itok=VDDtc3tb)
Data breaches that used email phishing as their initial attack vector cost organizations an average of $4.65 million, according to 2021 IBM report.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/phishing_outlook_laptop.jpg?itok=BXQGqXyr)
Digital attackers are misusing an email marketing service to trick recipients into handing over their Outlook account credentials.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/shutterstock_115174897_1.jpg?itok=aKr-XwD_)
Combined crypto-ransomware and double-extortion attacks empower greedy attackers to demand two ransoms: one for data decryption and one to delete stolen data.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/consultancy_thumb.jpg?itok=sivXQMh4)
Many consultancies see the MSP model as a natural next step to grow into a mature company. Yes, the MSP model can be more profitable, but where do you start?
Read more