Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ClickFix Campaign Targets Restaurant Reservations

BlueVoyant Threat Fusion Cell (TFC) researchers recently investigated a ClickFix attack with unique aspects. The attack began when a user for a UK-based organization navigated to a restaurant’s website for reservations, which they reportedly had used extensively in the past to conduct business meetings and corroborated in the logs.

Ransomware in First Half of 2025: An Ecosystem in Flux

The first half of 2025 has been a period of disruption and realignment within the ransomware ecosystem. Following years of dominance by a few key players, the landscape has fragmented into a chaotic and highly competitive market defined by new leaders, divergent attack strategies, and a laser focus on high-pressure targets. In total, more than 3,000 ransomware incidents were recorded in the first six months of the year. The overall threat has not diminished; it has become more unpredictable.

Why Microsoft Sentinel data lake Signals the Future of Security Operations

In our 1,200-plus Sentinel deployments, we've seen the same pattern play out repeatedly. Security teams forced to choose between comprehensive visibility and manageable costs. Logs getting aged out just when they become most valuable for investigations. Compliance requirements colliding with retention budgets. The pressure to do more with less doesn't come with a pause button. And until now, that pressure has meant making hard choices about what security data to keep and what to let go.
Featured Post

Navigating Cyber Threats in the Retail Sector

The UK retail sector stands at a critical crossroads. In a market where digital agility defines success and consumer trust can be won or lost in seconds, cyber security is no longer a back-office issue; it's a frontline brand priority. As malicious actors set their sights on retail's digital backbone from Point-of-Sale systems to complex supply chain networks, the potential for disruption has never been more tangible.

RecipeLister: A Recipe for Disaster

The BlueVoyant SOC consistently monitors and analyzes threats within customers instances 24x7. One threat we have been tracking and observing has been a free-ware software known as RecipeLister. This software claims to provide users with the capabilities of viewing and downloading recipes in order to assist in the journey of staying healthy. While this capability was rather appetizing, we discovered there was more to be unpacked by this software.

Maximizing Security ROI: The Cost Advantages of BlueVoyant's COMS Service

As an enterprise organization leveraging Microsoft's comprehensive security ecosystem — including Sentinel, Defender XDR, Defender for Cloud, and Microsoft Security Copilot — you've established a robust security operation. However, the security landscape continuously evolves including your organization's changing business requirements and Microsoft's ongoing platform enhancements.

Third-Party Breaches: Why You Should be Prioritizing Supply Chain Cyber Risk Today

Look at any collection of top 10 organizational security concerns from recent years, and “third-party breaches” are consistently high on the list. These attacks have caused financial and reputational damage to every sector, from banks to healthcare systems to retail to governments. And the problem is growing. Recent statistics highlight just how severe the issue has become.

Enhancing the Skills and Threat Detections of In-House SOCs and Security Teams

You've made the investment. Microsoft Defender XDR is deployed across your endpoints while Sentinel aggregates logs and generates alerts. Your security operations team completed initial training and familiarized themselves with the new tools. On paper, you have a modern security operation powered by Microsoft's robust security stack.

Navigating Cyber Threats in the Retail Sector

The UK retail sector currently stands at a crossroads where cyber security is not just a regulatory or operational obligation, but a cornerstone for success. As cyber threats continue to rise, understanding the impact of these threats and how they infiltrate the retail supply chain is vital for operational continuity.

What is an SBOM and Why is it Critical to Third-Party Risk Management?

A decade ago, the primary focus of TPRM was questionnaire management and distribution, usually done in a simple and manual way, relying on vendors to self-report on their security practices. Today the basic best practices of TPRM have grown to include continuous monitoring and other advanced AI-based capabilities like CVE alerting for third parties as elementary aspects of an effective program.