To Pay or Not to Pay: The Ransomware Dilemma

To Pay or Not to Pay: The Ransomware Dilemma

Disclaimer: In the majority of cases, the determination of whether or not to pay a ransom is a business decision, […] ...
Quarterly GRIT Ransomware Report — Q3 2024

Quarterly GRIT Ransomware Report — Q3 2024

As we wrap up the third quarter of 2024, it’s time to dive into the key takeaways from GRIT’s latest […] ...
Update from the Trenches

Update from the Trenches

Ivanti CSA Investigation/Detection Details   Authors: Rui Ataide, Andrew Nelson, and Hermes Bojaxhi GuidePoint Security has recently been engaged on […] ...
Risky Recovery: Ransomware “Decryption” Scams Remain in 2024

Risky Recovery: Ransomware “Decryption” Scams Remain in 2024

Note: To protect the identity of the individuals involved in these events, some details of the ransomware attack and recovery […] ...
GRIT Ransomware Report: August 2024

GRIT Ransomware Report: August 2024

Additional contributors to this report: Jason Baker, Ryan Silver, JP Mouton, and Grayson North In this month’s report, we highlight […] ...
Hazard Ransomware – A Successful Broken Encryptor Story

Hazard Ransomware – A Successful Broken Encryptor Story

Ransomware encryption can be one of the most devastating security events for an organization, potentially halting operations and causing significant […] ...
So-Phish-ticated Attacks

So-Phish-ticated Attacks

August 27, 2024 Authors: Rui Ataide, Hermes Bojaxhi The GuidePoint Research and Intelligence Team (GRIT) has been tracking a highly […] ...
GRIT Ransomware Report: July 2024

GRIT Ransomware Report: July 2024

Additional contributors to this report: Jason Baker, Justin Timothy, Ryan Silver, and JP Mouton July 2024 yielded some answers to […] ...
Update from the Ransomware Trenches

Update from the Ransomware Trenches

Authors: Rui Ataide, Hermes Bojaxhi GuidePoint’s DFIR team is frequently called upon to respond to Ransomware incidents. While many such […] ...
Fraudster’s Fumble: From Phish to Failure

Fraudster’s Fumble: From Phish to Failure

Additional Contributor: Jake Plant, Strategic Delivery Manager Introduction In contemporary cybercrime operations, Business Email Compromise (BEC) remains one of the […] ...