Threat Research Emulating the Mutative BlackByte Ransomware ByFrancis Guibernau February 25, 2026February 25, 2026
Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025January 14, 2026
Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-241A): Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations ByAyelen Torello August 29, 2024January 14, 2026
Threat Advisories Emulating the Long-Term Extortionist Nefilim Ransomware ByFrancis Guibernau July 11, 2024January 14, 2026
Threat Advisories Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 ByFrancis Guibernau July 3, 2024January 14, 2026
Threat Research Emulating the Southeast Asian Adversary OceanLotus ByFrancis Guibernau April 16, 2024January 15, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-319A): #StopRansomware: Rhysida Ransomware ByFrancis Guibernau November 20, 2023January 15, 2026
Threat Research Emulating the Controversial and Intriguing Rhysida Ransomware ByFrancis Guibernau September 20, 2023January 14, 2026
Threat Research Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByFrancis Guibernau January 5, 2023January 15, 2026
Insights & Perspectives Purple Hats 2021: It was an Event “Brimming” with Cybersecurity Goodness ByJordan McMahon June 24, 2021January 14, 2026
Insights & Perspectives AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity ByBrett Galloway January 12, 2021January 14, 2026