Jonathan Reiber «Previous: What Security Teams Can Learn from the Attacks on Twitter and COVID-19 Researchers Next: Episode 2: How to Achieve Cybersecurity Effectiveness»
Threat Research Testing your defenses against CVE-2022-30190: MSDT “Follina” 0-Day ByAdam Moore June 2, 2022January 14, 2026
Threat Research Emulating the Blazing DragonForce Ransomware ByFrancis Guibernau May 23, 2025January 14, 2026
Threat Research Emulating the Commodity Downloader GootLoader ByFrancis Guibernau October 9, 2023January 14, 2026
Threat Research Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025January 15, 2026
Industry & Community Building a Stronger Community for Threat Informed Defense ByCarl Wright May 25, 2021January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-057A): SVR Cyber Actors Adapt Tactics for Initial Cloud Access ByFrancis Guibernau February 27, 2024January 15, 2026