Category: Blog RSS Feed

The Cost of Ransomware: Shutdowns & Extortion

Ransomware is no longer in its heyday. Evolving, AI-driven cybersecurity tools and global law enforcement efforts have seen to that. But that doesn’t mean ransomware is no longer a threat. In fact, in some ways, the danger is greater than…

April 2025 Patch Tuesday Analysis

Today’s Patch Tuesday Alert addresses Microsoft’s April 2025 Security Updates. We are actively working on coverage for these vulnerabilities and expect to ship ASPL-1151 as soon as coverage is completed. In-The-Wild & Disclosed CVEs CVE-2025-29824 A vulnerability in the Windows…

How CEOs Can Embrace GenAI for Business Growth

It’s well-trodden ground by now, but generative AI is really one of the business world’s most important technologies. Like it or not, it will soon become integral to everyday business operations. Those who learn how to use it effectively will…

Tripwire Patch Priority Index for March 2025

Tripwire’s March 2025 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Google. Up first on the list are patches for Microsoft Edge (Chromium-based) and Google Chromium that resolve spoofing, out of bounds read, use after free, and…

HellCat Ransomware: What You Need To Know

What is HellCat? HellCat is the name of a relatively new ransomware-as-a-service (RaaS) group that first came to prominence in the second half of 2024. Like many other ransomware operations, HellCat breaks into organisations, steals sensitive files, and encrypts computer…

Top Cybersecurity Considerations When Moving Commercial Premises

When relocating office locations domestically or internationally, organizations must ensure the safe passage and management of more than just their physical assets and hardware. The complex cybersecurity obstacles before, during, and after an operational overhaul can outnumber the physical difficulties…

Japan Passes Active Cyber Defense Bill

Over the past few years, many countries have made considerable efforts to bolster cybersecurity preparedness. These efforts are understandable when put into a geopolitical context: global relationships in the past five years have been among the most tumultuous in decades,…

Top Cybersecurity Considerations When Moving Commercial Premises

When relocating office locations domestically or internationally, organizations must ensure the safe passage and management of more than just their physical assets and hardware. The complex cybersecurity obstacles before, during, and after an operational overhaul can outnumber the physical difficulties…

Japan Passes Active Cyber Defense Bill

Over the past few years, many countries have made considerable efforts to bolster cybersecurity preparedness. These efforts are understandable when put into a geopolitical context: global relationships in the past five years have been among the most tumultuous in decades,…

VanHelsing Ransomware: What You Need To Know

What is the VanHelsing ransomware? First reported earlier in March 2025, VanHelsing is a new ransomware-as-a-service operation. Oh, so it’s a relatively new player on the malware scene, then. Why the concern? At least three victims of VanHelsing have already…

An Introduction to Data Masking in Privacy Engineering

Protecting individual privacy is paramount, given the proliferation of Personally Identifiable Information (PII) and other sensitive data collected by enterprises across all industries. One way to protect sensitive data is through PII masking e.g., consistently changing names or including only…

Top 10 Scam Techniques: What You Need to Know

Scammers are highly resourceful and cunning when devising new ways to swindle people. But they often rely on long-standing persuasion techniques for their tricks to work. So, you may hear about a new scam that uses a novel narrative, but…

BlackLock Ransomware: What You Need To Know

What is the BlackLock ransomware? BlackLock is a relatively new ransomware group. First seen in March 2024, the ransomware operation initially operated under the name El Dorado, before rebranding as BlackLock late last year. BlackLock follows a RaaS (ransomware-as-a-service) business…