Featured Insights
Trending
Most Recent
Ankura CTIX FLASH Update – April 7, 2026
Malware Activity Why Today’s Cyberattacks Are Harder to StopCyberattacks are rapidly evolving, with device code phishing and multi‑extortion ransomware emerging as two of the most dangerous trends facing organizations today. Device code phishing attacks have surged more than thirty-seven (37) times this year, exploiting a legitimate login process meant for devices like smart TVs and ...
The Business Behind Sport: Volleyball World’s Commercial Innovation With Ugo Valensi, CEO of Volleyball World
800 million fans worldwide. 24 million social media followers. Volleyball is a top three global sport entering a new phase of commercial opportunity. In this episode of The Business Behind Sport, Ugo Valensi, CEO of Volleyball World, joins Jonny Gray to discuss how the sport is unlocking commercial opportunity through a 67/33 joint venture model, centralised rights, and a fan-first digital strategy.
Spending Holds, Stress Builds: The U.S. Economy Enters a Fragile Phase
U.S. consumers continue to spend, but resilience is increasingly strained. Real wage gains and essential driven demand are sustaining near term activity, even as sentiment weakens and household balance sheets come under pressure from record debt, rising delinquencies, and renewed energy driven inflation risks.
The Impact Exchange | The New PE Playbook: Finding Value in Fragmented Markets
In a market where private equity (PE) is searching for its next growth engine, where does real value actually come from? The answer may surprise you.
UAE Trends and Developments: The 2026 Cyber Horizon
The United Arab Emirates’ (UAE’s) cyber risk landscape is intensifying as artificial intelligence (AI) adoption, digital transformation, and legacy technology exposure converge with heightened regulatory scrutiny — expanding the country’s attack surface and increasing organizational accountability.
Ankura CTIX FLASH Update – April 3, 2026
Malware Activity How Attackers Are Weaponizing App Stores and Messaging AppsRecent investigations highlight a troubling trend in which attackers are abusing trusted platforms to quietly compromise both mobile and desktop devices at scale. On Android, a sophisticated malware known as NoVoice was distributed through the official Google Play Store, hidden inside legitimate‑looking apps that infected over 2.3 million devices before being removed. These apps worked as advertised and raised no immediate red flags yet exploited outdated Android security flaws to gain deep system access and embed themselves so thoroughly that even factory resets may not fully remove them. At the ...
Managing Claims and Avoiding Conflict Through Documentation, Communication, and Early Action
Ankura’s Thomas Certo recently shared insights during a panel discussion at the Canadian Institute’s 18th Annual Conference on Navigating Risk in Construction Projects & Contracts, West, held in Calgary. The panel brought together legal and advisory professionals to discuss delays and damages, and to share practical strategies for managing claims and avoiding conflict.
Contract Risk in Focus: Enhancing Project Success Through Proactive Communication
Construction projects are inherently complex, multidisciplinary, and high‑risk. While contracts are designed to allocate responsibility and manage uncertainty, disputes often arise not from the contract language itself, but from how teams communicate across the project lifecycle.
Reclaiming Store Labor: Put Hours Back on the Sales Floor
Retailers are not short on labor effort — they are short on productive, customer-facing time. Over the last decade, store operations have absorbed growing complexity: tighter delivery windows, more frequent price changes, more frequent resets to keep up with product trends, omnichannel fulfillment, promotional churn, and exception-driven work that pulls associates off the floor at exactly the wrong moments.
Ankura CTIX FLASH Update – April 1, 2026
Malware Activity How Social Engineering and Supply‑Chain Threats Are Targeting macOS and DevelopersRecent security research highlights a growing wave of attacks that rely on deception and trust, rather than traditional software vulnerabilities, to compromise macOS users and developers. One campaign, known as Infinity (or Infiniti) Stealer, uses fake Cloudflare‑style CAPTCHA pages to trick Mac users ...









