Threat Research Emulating the Elegant BlackSuit Ransomware ByFrancis Guibernau January 20, 2026January 20, 2026
Threat Advisories React2Shell (CVE-2025-55182): Critical Remote Code Execution (RCE) in React Server Components ByFrancis Guibernau December 18, 2025January 15, 2026
Threat Research Revisiting the Versatile Qilin Ransomware ByFrancis Guibernau November 19, 2025January 15, 2026
Threat Advisories Updated Response to CISA Advisory (AA24-109A): Akira Ransomware ByFrancis Guibernau November 18, 2025January 15, 2026
Threat Research Ransom Tales: Volume V — Throwback Edition! Emulating REvil, DarkSide, and BlackMatter Ransomware ByFrancis Guibernau November 6, 2025January 15, 2026
Threat Research Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025January 15, 2026
Threat Advisories Response to Oracle Security Alert Advisory: Oracle E-Business Suite Pre-Auth RCE (CVE-2025-61882) ByAyelen Torello October 9, 2025January 15, 2026
Threat Research Emulating the Versatile Qilin Ransomware ByAyelen Torello October 2, 2025January 15, 2026
Threat Research Ransom Tales: Volume IVÂ – Emulating Rhysida, Charon and Dire Wolf Ransomware ByAyelen Torello September 25, 2025January 15, 2026
Threat Advisories Response to CISA Advisory (AA25-266A): CISA Shares Lessons Learned from an Incident Response Engagement ByAyelen Torello September 24, 2025January 15, 2026
Threat Research Ransom Tales: Volume IIIÂ –Â Emulating INC, Lynx and SafePay Ransomware ByFrancis Guibernau August 28, 2025January 15, 2026
Threat Research Emulating the Expedited Warlock Ransomware ByFrancis Guibernau August 27, 2025January 15, 2026
Threat Advisories Response to CISA Alert: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities ByFrancis Guibernau July 30, 2025January 15, 2026
Threat Research Ransom Tales: Volume II – Emulating Gunra, Anubis and DevMan Ransomware ByFrancis Guibernau July 29, 2025January 15, 2026
Threat Research Ransom Tales: Volume I – Emulating BlackLock, Embargo, and Mamona Ransomware ByFrancis Guibernau July 22, 2025January 14, 2026
Threat Advisories Updated Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware ByFrancis Guibernau June 12, 2025January 14, 2026
Threat Research Emulating the Blazing DragonForce Ransomware ByFrancis Guibernau May 23, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA25-141B): Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations ByFrancis Guibernau May 22, 2025January 14, 2026
Threat Research Emulating the Terrorizing VanHelsing Ransomware ByAyelen Torello May 15, 2025January 14, 2026
Threat Research Emulating the Infestive Termite Ransomware ByFrancis Guibernau May 8, 2025January 14, 2026
Threat Research Emulating the Hellish Helldown Ransomware ByFrancis Guibernau April 24, 2025January 14, 2026
Threat Research Emulating the Stealthy StrelaStealer Malware ByAyelen Torello April 17, 2025January 14, 2026
Threat Research Emulating the Misleading CatB Ransomware ByAyelen Torello April 9, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA25-071A): #StopRansomware: Medusa Ransomware ByAyelen Torello March 13, 2025January 14, 2026