Threat Research Emulating the Destructive Sandworm Adversary ByAyelen Torello November 14, 2025January 15, 2026
Threat Research Emulating the Espionage-Oriented Group SideWinder ByAyelen Torello November 13, 2025January 15, 2026
Threat Research Emulating the Versatile Qilin Ransomware ByAyelen Torello October 2, 2025January 15, 2026
Threat Advisories Response to CISA Advisory (AA25-239A): Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System ByAyelen Torello September 4, 2025January 15, 2026
Threat Advisories Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies ByAyelen Torello May 21, 2025January 14, 2026
Threat Research Emulating the Sophisticated Russian Adversary Seashell Blizzard ByAyelen Torello April 2, 2025January 14, 2026
Threat Research Emulating the Sophisticated Chinese Adversary Salt Typhoon ByFrancis Guibernau March 19, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-241A): Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations ByAyelen Torello August 29, 2024January 14, 2026
Threat Advisories Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 ByFrancis Guibernau July 3, 2024January 14, 2026
Threat Advisories Emulating the Notorious Chinese State-Sponsored Winnti Group ByAyelen Torello June 20, 2024January 14, 2026
Threat Research Emulating the Sabotage-Focused Russian Adversary Sandworm-Part 1 ByFrancis Guibernau March 6, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-057A): SVR Cyber Actors Adapt Tactics for Initial Cloud Access ByFrancis Guibernau February 27, 2024January 15, 2026
Product & Platform In the Cyber Jungle, the Mighty Mustang Panda Phishes Tonight ByMadison Steel January 24, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA23-339A): Threat Actors Exploit Adobe ColdFusion CVE-2023-26360 for Initial Access to Government Servers ByFrancis Guibernau December 7, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-319A): #StopRansomware: Rhysida Ransomware ByFrancis Guibernau November 20, 2023January 15, 2026
Threat Research Emulating the Controversial and Intriguing Rhysida Ransomware ByFrancis Guibernau September 20, 2023January 14, 2026
Threat Research Emulating the Iranian State-Sponsored Adversary APT35 ByFrancis Guibernau August 18, 2023January 15, 2026
Threat Advisories Response to CISA Advisory (AA23-144A): China State-Sponsored Actor Volt Typhoon Living off the Land to Evade Detection ByFrancis Guibernau May 25, 2023January 15, 2026
Threat Research Emulating Recent Activity from the Russian Adversary Nobelium / APT29 ByFrancis Guibernau May 4, 2023January 15, 2026
Product & Platform Attack Graph Response to CISA Advisory (AA23-074A): Threat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server ByMadison Steel March 17, 2023January 15, 2026
Threat Research Emulating the Cybercriminal Initial Access Broker TA551 ByFederico Quattrin March 3, 2023January 15, 2026
Threat Research Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByFrancis Guibernau January 5, 2023January 15, 2026