Jonathan Reiber «Previous: What Security Teams Can Learn from the Attacks on Twitter and COVID-19 Researchers Next: Episode 2: How to Achieve Cybersecurity Effectiveness»
Threat Research Windows Service Permissions and DLL Sideloading ByTim Morgan March 28, 2024January 14, 2026
Threat Research Emulating the Sabotage-Focused Russian Adversary Sandworm-Part 1 ByFrancis Guibernau March 6, 2024January 14, 2026
Threat Research Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025January 15, 2026
Threat Research Emulating the Blazing DragonForce Ransomware ByFrancis Guibernau May 23, 2025January 14, 2026
Threat Research Ransomware and Targeted Attacks in the Healthcare Sector ByAndrew Costis September 23, 2021January 14, 2026