Storagepipe Is Now Thrive

GridWay Is Now Thrive

Security

While routine CI/CD pipelines ran and developer machines updated their dependencies, a state-sponsored actor had already poisoned one of the most trusted libraries in modern software. The Axios compromise was not a test; it was a pre-positioned strike against…

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
April 1, 2026 6 Min Read

While Handala’s wiper operation made headlines, a stealthier and more dangerous campaign was already underway. Iran’s Seedworm grou...

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
March 20, 2026 6 Min Read

A Fortune 500 medical technology giant left with 200,000 wiped devices, surgical supply chains halted, and cardiac monitoring systems taken ...

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
March 13, 2026 5 Min Read
Subscribe Via Email

Geopolitical conflicts increasingly extend beyond traditional battlefields. Today, military escalation is often accompanied by coordinated cyber activity conducted by nation-state actors and affiliated groups seeking to gather intelligence, disrupt adversaries, and position themselves strategically in the global…

Christopher Clark, Simon White, and Orlahn Fabian, cybersecurity incident responder team
March 4, 2026 2 Min Read

If you are thinking “I’ve heard of the dark web, but I don’t really know what it is,” well, I am here to shed some light on the mysteries of the dark web. The term…

Scott Sweren, vCISO, Advisory Services
December 12, 2025 4 Min Read

When ransomware is dropped on your desktop and file shares, it feels like the beginning of the nightmare. It’s the final scene. Long before encryption begins, attackers have already worked their way through the network…

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
September 9, 2025 4 Min Read

When talking about security or real-life attacks, the focus naturally tends to be on the things that went wrong. Security reports look at th...

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
July 28, 2025 3 Min Read

The most powerful word in root cause analysis is why. Not just what happened, but why. If you trace it back a few steps, that can give a pre...

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
July 21, 2025 4 Min Read

There are a lot of different types of malicious software (malware). Viruses and worms directly infect systems for a specific purpose. This c...

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
June 30, 2025 4 Min Read

Early in 2025, a Thrive customer noticed something odd. One seemingly innocuous CPU spike was the first indicator of a problem that could have potentially destroyed an entire multi-state manufacturing company. The Background Before the…

Christopher Clark, Cybersecurity Incident Responder and Threat Hunter
June 23, 2025 5 Min Read