CC logo blue CC logo blue
CC logo blue
  • State of Security
  • Security Solutions
    • Zero Trust
    • System Integrity
    • File Integrity Monitoring
    • System Hardening
    • Ransomware
    • Zero-Day Attacks
  • CimTrak
    • New to CimTrak?
      • Why CimTrak?
      • Quick Overview
      • Instant Preview
      • Pricing
      • Free Trial
      • Demo
    • Security
      • CimTrak for Servers
      • CimTrak for Workstations
      • CimTrak for POS Stations
      • CimTrak for Network Devices
      • CimTrak for Databases
      • CimTrak for AD/LDAP
      • CimTrak for Hypervisors
      • CimTrak for Cloud Security
      • CimTrak for Containers
    • Compliance
      • CimTrak for Compliance
    • Risk Mitigation
      • CimTrak Trusted File Registry
    • Workflow & Reporting
      • CimTrak Ticketing
      • CimTrak SIEM Integration
  • Resources
    • About Cimcor
    • Blog
    • News
    • Events
    • Resource Library
    • Incident Alerts
    • New Features
    • Industries We Serve
    • Supported Platforms, Benchmarks, & Integrations
  • Partners
    • Find a Reseller
    • Channel Partners
    • Strategic and Technology Partners
    • Portal Login
    • Become a partner
  • State of Security
  • Security Solutions
    • Zero Trust
    • System Integrity
    • File Integrity Monitoring
    • System Hardening
    • Ransomware
    • Zero-Day Attacks
  • CimTrak
    • New to CimTrak?
      • Why CimTrak?
      • Quick Overview
      • Instant Preview
      • Pricing
      • Free Trial
      • Demo
    • Security
      • CimTrak for Servers
      • CimTrak for Workstations
      • CimTrak for POS Stations
      • CimTrak for Network Devices
      • CimTrak for Databases
      • CimTrak for AD/LDAP
      • CimTrak for Hypervisors
      • CimTrak for Cloud Security
      • CimTrak for Containers
    • Compliance
      • CimTrak for Compliance
    • Risk Mitigation
      • CimTrak Trusted File Registry
    • Workflow & Reporting
      • CimTrak Ticketing
      • CimTrak SIEM Integration
  • Resources
    • About Cimcor
    • Blog
    • News
    • Events
    • Resource Library
    • Incident Alerts
    • New Features
    • Industries We Serve
    • Supported Platforms, Benchmarks, & Integrations
  • Partners
    • Find a Reseller
    • Channel Partners
    • Strategic and Technology Partners
    • Portal Login
    • Become a partner
Technical Summary
Free Trial

The Evolving Triad of Cyber Threats: BEC, Ransomware, and Supply Chain Attacks

Lauren Yacono
by Lauren Yacono
on April 11, 2024

Historically, cybercriminals have been happy to stick with proven tactics for as long as possible. After all, it's a business to them—if it ain't broke, why fix it? However, this is not to suggest ...

Read More

Posts about Cybercrime (2)

April 04, 2024 • 9 min read
The Change Healthcare Cyberattack
By Lauren Yacono
March 26, 2024 • 6 min read
The Professionalism of Cybercrime
By Lauren Yacono
February 22, 2024 • 9 min read
Cloudflare Breached by Nation-State Hackers
By Lauren Yacono

Subscribe to Email Updates

Posts by Topic

  • Cybersecurity (154)
  • File Integrity Monitoring (73)
  • Podcast (62)
  • Compliance (59)
  • News (35)
  • Zero Trust (31)
  • System Integrity Assurance (20)
  • Cybercrime (15)
  • CyberAttack (13)
  • System Hardening (10)
  • Next-Gen File Integrity Monitoring (4)
Prev 1 2 All
CC logo

Real-time, File Integrity Monitoring, System Integrity Assurance, Security, and Compliance.

Technical Summary (PDF)
  • linkedin
  • facebook
  • TwitterX
  • G2

© 2025 Cimcor, Inc

  • Home
  • About Cimcor
  • Find a Reseller
  • Become a Partner
  • Privacy
  • Careers
  • State of Security
  • System Integrity
  • Solutions
  • Compliance
  • Resources
  • Partners
  • Trial
  • Quote
  • Pricing
  • Customized Demo
  • Support
  • Contact Us