Adversary Emulation Revisiting the Versatile Qilin Ransomware ByFrancis Guibernau November 19, 2025November 19, 2025
CISA Advisory Updated Response to CISA Advisory (AA24-109A): Akira Ransomware ByFrancis Guibernau November 18, 2025November 19, 2025
Adversary Emulation Ransom Tales: Volume V — Throwback Edition! Emulating REvil, DarkSide, and BlackMatter Ransomware ByFrancis Guibernau November 6, 2025November 13, 2025
Adversary Emulation Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025October 16, 2025
Adversary Emulation Response to Oracle Security Alert Advisory: Oracle E-Business Suite Pre-Auth RCE (CVE-2025-61882) ByAyelen Torello October 9, 2025October 9, 2025
Adversary Emulation Emulating the Versatile Qilin Ransomware ByAyelen Torello October 2, 2025October 2, 2025
Adversary Emulation Ransom Tales: Volume IVÂ – Emulating Rhysida, Charon and Dire Wolf Ransomware ByAyelen Torello September 25, 2025September 25, 2025
CISA Advisory Response to CISA Advisory (AA25-266A): CISA Shares Lessons Learned from an Incident Response Engagement ByAyelen Torello September 24, 2025September 24, 2025
Adversary Emulation Ransom Tales: Volume IIIÂ –Â Emulating INC, Lynx and SafePay Ransomware ByFrancis Guibernau August 28, 2025September 15, 2025
Adversary Emulation Emulating the Expedited Warlock Ransomware ByFrancis Guibernau August 27, 2025August 27, 2025
CISA Alert Response to CISA Alert: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities ByFrancis Guibernau July 30, 2025August 12, 2025
Adversary Emulation Ransom Tales: Volume II – Emulating Gunra, Anubis and DevMan Ransomware ByFrancis Guibernau July 29, 2025August 5, 2025
Adversary Emulation Ransom Tales: Volume I – Emulating BlackLock, Embargo, and Mamona Ransomware ByFrancis Guibernau July 22, 2025July 30, 2025
Adversary Emulation Updated Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware ByFrancis Guibernau June 12, 2025July 31, 2025
Adversary Emulation Emulating the Blazing DragonForce Ransomware ByFrancis Guibernau May 23, 2025July 29, 2025
Adversary Emulation Response to CISA Advisory (AA25-141B): Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations ByFrancis Guibernau May 22, 2025July 29, 2025
Adversary Emulation Emulating the Terrorizing VanHelsing Ransomware ByAyelen Torello May 15, 2025July 29, 2025
Adversary Emulation Emulating the Infestive Termite Ransomware ByFrancis Guibernau May 8, 2025July 29, 2025
Adversary Emulation Emulating the Hellish Helldown Ransomware ByFrancis Guibernau April 24, 2025August 18, 2025
Adversary Emulation Emulating the Stealthy StrelaStealer Malware ByAyelen Torello April 17, 2025July 31, 2025
Adversary Emulation Emulating the Misleading CatB Ransomware ByAyelen Torello April 9, 2025July 21, 2025
Adversary Emulation Response to CISA Advisory (AA25-071A): #StopRansomware: Medusa Ransomware ByAyelen Torello March 13, 2025July 21, 2025
Adversary Emulation Emulating the Relentless RansomHub Ransomware ByAyelen Torello March 6, 2025July 31, 2025
Adversary Emulation Emulating the Deceptive Akira Ransomware ByFrancis Guibernau February 26, 2025July 31, 2025