Subscribe

Social Media Links

Featured Insights

Most Recent

Ankura CTIX FLASH Update – May 19, 2026

Malware Activity How Cyber Attacks Are Evolving from Stealing Credentials to Quietly Manipulating Systems Recent research highlights two (2) major shifts in cyber threats, showing how attackers are becoming more sophisticated and harder to detect. One article explains how the Tycoon2FA phishing kit now tricks Microsoft 365 users into unknowingly granting account access through a ...

The Future of Pet Care: Trends Shaping a $158 Billion Industry

The U.S. pet industry continues to demonstrate durable, recession-resistant growth, reaching $158 billion in spending in 2025, led by strong demand in food, treats, and veterinary care.

Ankura CTIX FLASH Update – May 18, 2026

Malware Activity Modern Supply‑Chain Attacks Using Signed Artifacts and Living‑off‑the‑Land Techniques Recent cyber incidents show how attackers are increasingly exploiting trust in legitimate software rather than relying on obvious hacks. In the Mini Shai‑Hulud campaign, threat actors compromised popular open‑source developer tools by hijacking trusted automated release pipelines, allowing malicious updates to be published with ...

Sizing is the New Fault Line

The apparel industry has navigated plenty of advancements and disruptions — fast fashion, e-commerce, the COVID-19 pandemic-era athleisure boom. But GIP and GLP-1 medications (collectively, “GLP-1”) represent something categorically different: a biological shift in the American body, happening at scale, faster than the industry’s planning and size-curve systems were designed to accommodate.

BCM: Protecting Operations in an Age of Disruption

In an increasingly complex operating environment, disruption is no longer a remote risk but rather a sustained and predictable condition for organizations. Heightened regional tensions, cyber threats, supply chain shocks, and climate-related events mean that government entities and private companies are expected to demonstrate clear readiness to maintain operations under pressure.

A Case Study | Building Resilience Against Operational Disruption

Challenged with an evolving regulatory environment and heightened regional risk context, a major government-owned organization faced increasing expectations from its board, regulators, and stakeholders to demonstrate operational readiness, continuity of critical services, and structured crisis response capabilities aligned with national priorities.

Beyond Annual Audit | Strengthening Fraud Oversight in China

In recent years, multinational companies operating in China have devoted significant attention to external risk factors such as geopolitical tensions and trade disputes. Yet while external risks command executive focus, internal risks can quietly accumulate. Paul Tan explains the different mandates of external auditors and forensic auditors, the practical implications of those differences, and why deploying the right expertise at the right time materially influences outcomes when concerns arise.

Morpheus Unmasked: Big Game Hunting and Private Data Sales

Recent Ankura cases dealing with Morpheus ransomware group suggest that a new approach to the ransomware ecosystem is gaining popularity among threat actors. Typically, when a ransom is not paid, the threat actor resorts to leaking the victim’s data. In these situations, Ankura’s Cyber Threat Investigation & Expert Services (CTIX) analysts navigate the dark web and conduct covert downloads to determine exactly what data has been publicly leaked and exposed on the threat actor’s dark web leak site.

Redefining the PMO: Driving Alignment, Decisions, and Outcomes

As organizations continue to invest heavily in transformation and delivery, the role of the project management office (PMO) is being reexamined through a more strategic lens.

Ankura CTIX FLASH Update – May 12, 2026

Malware Activity When Trusted Platforms Become the Delivery Vehicle for Malware Recent research highlights two (2) growing malware campaigns that show how attackers are exploiting trust and familiarity to bypass security controls. In one campaign, Mac users searching Google for a Claude AI download are lured by sponsored ads that appear legitimate and lead to ...

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with