Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025January 14, 2026
Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-241A): Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations ByAyelen Torello August 29, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA23-349A): Enhancing Cyber Resilience: Insights from the CISA Healthcare and Public Health Sector Risk and Vulnerability Assessment ByAndrew Costis December 22, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-319A): #StopRansomware: Rhysida Ransomware ByFrancis Guibernau November 20, 2023January 15, 2026
Threat Research Emulating the Controversial and Intriguing Rhysida Ransomware ByFrancis Guibernau September 20, 2023January 14, 2026
Threat Research Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByFrancis Guibernau January 5, 2023January 15, 2026