Blog
![](/sites/default/files/styles/resource_image/public/2021-08/Bingo%20%281%29.png?itok=Nf1-9QSo)
A phishing campaign packed an executable file together with a bingo game to distribute AgentTesla as its final malware payload.
Read moreThe 2021 mid-year threat report is now available. This blog highlights what stands out from the report - highly sophisticated email attacks.
Read more![](/sites/default/files/styles/resource_image/public/2021-07/17ad2a47-a0b9-4ab1-8378-39dd6ca85ac9.jpg?itok=51g8gVcV)
Crypto-ransomware threats are the most familiar ransomware subcategory, but how do they differ from locker threats - another prevalent ransomware type?
Read more![](/sites/default/files/styles/resource_image/public/2021-07/handoff_thumb.png?itok=-LN_-Jq8)
Organizations must defend themselves against Ransomware-as-a-Service (RaaS), where malware authors franchise ransomware to affiliates for a cut of the profit.
Read more![](/sites/default/files/styles/resource_image/public/2021-07/NFT_thumbnail_0.jpg?itok=ziV43hyO)
NFTs are all the rage at the moment, but how safe are they? Learn about all the potential NFT security risks right here.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/shutterstock_97947788.jpg?itok=D2UehqMH)
Phishers are using Request For Quote (RFQ)-themed emails to infect users with BitRAT.
Read more![](/sites/default/files/styles/resource_image/public/2021-08/shutterstock_381764248.png?itok=nwppGcJ6)
Ransomware cripples the target company’s operations, making it much different from an attack that steals data. The implication of this became clear as I developed a contingency plan to pay a ransom. Before thinking through the issue, I pictured the payment as a get-out-of-jail
Read more![](/sites/default/files/styles/resource_image/public/2021-08/shutterstock_376865053.jpg?itok=_QjgsfwH)
In 2020, ransomware attacks increased by 485% compared to 2019. The majority (64%) of those attacks took place in the first two quarters of the year, reported Infosecurity Magazine.
Read more![](/sites/default/files/styles/resource_image/public/2021-07/feedburner_2.png?itok=aHFfmFXM)
Email attackers are leveraging Feedburner links to redirect recipients to phishing pages.
Read more![](/sites/default/files/styles/resource_image/public/2021-03/Ryuk-Ransomware.jpg?itok=3VV-aa9_)
Email is one of the most common delivery vectors employed by ransomware attackers today.
Read more![](/sites/default/files/styles/resource_image/public/2021-07/revil_thumb_0.jpg?itok=TKADcYGj)
The REvil ransomware gang demanded $70 million in a software supply chain attack involving American software company Kaseya.
Read more![](/sites/default/files/styles/resource_image/public/2021-07/kaseya_cover.jpg?itok=_9onFnmz)
Ransomware continues to be a major threat, and just this week one of our own MSPs was hit. Learn more about this recent ransomware episode here.
Read more