Jonathan Reiber «Previous: Episode 2: How to Achieve Cybersecurity Effectiveness Next: AttackIQ’s business is not security testing.»
Threat Research Ransom Tales: Volume III – Emulating INC, Lynx and SafePay Ransomware ByFrancis Guibernau August 28, 2025January 15, 2026
Threat Research Emulating the Hellish Helldown Ransomware ByFrancis Guibernau April 24, 2025January 14, 2026
Threat Research Emulating the Versatile Qilin Ransomware ByAyelen Torello October 2, 2025January 15, 2026
Threat Research Compliance and Cyber Security Risk Reduction Don’t have to be Enemies ByTim Morgan February 8, 2022January 14, 2026
Threat Research Emulating the Southeast Asian Adversary OceanLotus ByFrancis Guibernau April 16, 2024January 15, 2026
Threat Research Emulating the Sophisticated Russian Adversary Seashell Blizzard ByAyelen Torello April 2, 2025January 14, 2026