Threat Advisories Response to CISA Advisory (AA25-343A): Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure ByFrancis Guibernau December 10, 2025January 14, 2026
Threat Research Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025January 14, 2026
Threat Research Emulating the Versatile Qilin Ransomware ByAyelen Torello October 2, 2025January 14, 2026
Threat Research Emulating the Sophisticated Russian Adversary Seashell Blizzard ByAyelen Torello April 2, 2025January 14, 2026
Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025January 14, 2026
Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024January 14, 2026
Threat Advisories Emulating the Politically Motivated North Korean Adversary Andariel – Part 2 ByFrancis Guibernau July 31, 2024January 14, 2026
Threat Advisories Emulating the Long-Term Extortionist Nefilim Ransomware ByFrancis Guibernau July 11, 2024January 14, 2026
Threat Advisories Emulating the Notorious Chinese State-Sponsored Winnti Group ByAyelen Torello June 20, 2024January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-319A): #StopRansomware: Rhysida Ransomware ByAttackIQ Team November 20, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-263A): #StopRansomware: Snatch Ransomware ByAttackIQ Team October 4, 2023January 14, 2026
Threat Research Emulating the Controversial and Intriguing Rhysida Ransomware ByFrancis Guibernau September 20, 2023January 14, 2026
Threat Research Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByAttackIQ Team January 5, 2023January 14, 2026