Arctic Wolf Unveils Incident360 Retainer to Strengthen Cyber Incident Response

Planning Is Preparation There’s an old saying: failing to plan is planning to fail. In the digital age, this still applies. Yet many organizations lack a complete incident response plan to address the aftermath of a cyberattack. Arctic Wolf’s new Incident360 Retainer seeks to change that. A Shift from Traditional Retainers Legacy incident response retainers … Read more

Cyber Insurance Claims Surge: BEC and Fraud Top Coalition’s Report on 2024 Insurance Claims

Coalition’s newly released 2025 Cyber Claims Report outlines key cyber trends that shaped the digital threat landscape and influenced insurance outcomes for its policyholders across 2024. The report reveals that business email compromise (BEC) and funds transfer fraud (FTF) dominated claims, accounting for 60% of all incidents. Coalition notes its proactive “Active Insurance” model played … Read more

Cybersecurity Threats and Wire Fraud: How Law Firms Can Avoid Legal Liability in 2025

Attorneys face rising cybersecurity threats as wire fraud schemes grow in frequency and cost. That take and further analysis courtesy of a meandering search of the internet and stumbling across this recent post from Integreon, a global provider of legal and compliance outsourcing. Their article highlights how cyberattacks like business email compromise (BEC) are targeting … Read more

AI-Powered Identity Security: Cowbell IdentityAI Slashes Breach Detection Time

New AI Security Solution Addresses Lateral Movement and Wire Fraud Risks Following our recent reports on AI-driven cyberattacks, Cowbell has introduced IdentityAI, an AI-powered tool designed to detect and mitigate identity-based threats. This solution aims to address the growing risks of business email compromise (BEC), lateral movement, and fraudulent wire transactions—issues that have led to … Read more

96% of Ransomware Attacks Now Involve Data Theft, Arctic Wolf Report

Almost all, a staggering, 96% of ransomware incidents now involve data breaches with data theft. This marks a significant shift in cybercriminals’ strategies. This is according to Arctic Wolf’s 2025 Threat Report. The cybersecurity report’s findings highlight how threat actors are adapting to stronger cybersecurity defenses by prioritizing cyber extortion and leveraging vulnerabilities for infiltration. … Read more

×