Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Practical Guide to Adopting a Zero Trust Architecture

As organizations adapt to hybrid work, cloud adoption, and expanding digital ecosystems, traditional perimeter-based security models are no longer enough. Zero Trust has emerged as a leading framework to help reduce risk, improve visibility, and strengthen resilience, but implementation remains a challenge for many. This whitepaper explores how organizations can adopt Zero Trust in a practical, phased approach, aligned to real business and risk priorities.

The AI Revolution: Embracing the Future of eDiscovery

The eDiscovery landscape is undergoing a profound transformation, driven by the rapid evolution of artificial intelligence (AI). What was once a labor-intensive, manual process is now being revolutionized by technologies capable of analyzing vast volumes of data with speed, precision and insight. AI is not just a buzzword; it’s a catalyst for smarter, faster and more defensible legal workflows.

XWORM Returns to Haunt Systems with Ghost Crypt

Starting in July 2025, Kroll has observed a new delivery method coming from the XWORM malware family. Previously known to leverage a self-contained executable in order to drop the final payload, XWORM now uses Ghost Crypt which is a service publicized on HackForums and used to exploit DLL side-loading vulnerabilities in known applications. The service includes support for a range of malware families, including LUMMASTEALER, BLUELOADER, RHADAMANTHYS, XWORM, DCRAT, PURELOADER, STEALC and others.

Kroll Conversations: Meet the Offensive Security Experts

Organizations are under constant threat from vulnerabilities hidden deep within their own systems and applications. Uncovering these types of weaknesses before they lead to security issues such as malware, ransomware attacks and social engineering is a challenge that Jugal Bhatt and Jonathan Hosick take on every day.

Best Practices for Securing Operational Technology

Operational technology (OT) underpins everyday life by providing the networks and systems required to deliver and maintain key services. These critical infrastructures are increasingly targeted by threat actors, causing public disruption and reputational and financial damage. OT security plays a vital role in redressing this threat, but it must be implemented strategically to be effective.

The Invisible Threat: Rethinking OT Security for Clean Energy and National Infrastructure

A recent revelation of a Chinese-manufactured “kill switch” embedded in power inverters has reignited global conversations about cyber risk, supply chain vulnerabilities and geopolitical dependencies in the Operational Technology (OT) ecosystem.

OT Security Lessons from the Trenches: Patterns and Pitfalls from BACS Assessments

The convergence of Building Automation and Control Systems (BACS) and smart building innovation within operational technology (OT) is helping to drive technological and environmental advances. However, it is also contributing to the emergence of significant security vulnerabilities and threats.

Known vs. Unknown Risks: The Role of the Enterprise Risk Retainer in Preparing for the Future

Preparing for risk is critical to ensuring organizational resilience, but what about the risks that can’t be planned for? Businesses frequently fall into the trap of strategizing only for known risks—those that are easily anticipated—while failing to recognize their blind spots in relation to unknown risk events.