Adversary Emulation Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025October 16, 2025
Adversary Emulation Emulating the Expedited Warlock Ransomware ByFrancis Guibernau August 27, 2025August 27, 2025
Adversary Emulation Emulating the Terrorizing VanHelsing Ransomware ByAyelen Torello May 15, 2025July 29, 2025
Adversary Emulation Emulating the Relentless RansomHub Ransomware ByAyelen Torello March 6, 2025July 31, 2025
Adversary Emulation Emulating the Deceptive Akira Ransomware ByFrancis Guibernau February 26, 2025July 31, 2025
Adversary Emulation Emulating the Splintered Hunters International Ransomware ByFrancis Guibernau January 27, 2025July 31, 2025
Cybersecurity Advisory Response to CISA Advisory (AA25-022A): Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications ByFrancis Guibernau January 24, 2025July 31, 2025
Adversary Emulation Emulating the Petrifying Medusa Ransomware ByFrancis Guibernau September 19, 2024July 31, 2025
Adversary Emulation Emulating the Long-Term Extortionist Nefilim Ransomware ByFrancis Guibernau July 11, 2024July 31, 2025
Adversary Emulation Response to CISA Advisory (AA23-353A): #StopRansomware: ALPHV BlackCat ByFrancis Guibernau December 29, 2023July 31, 2025
Adversary Emulation | Cybercrime | Ransomware Attack Graph Response to CISA Advisory AA23-165A: Understanding Ransomware Threat Actors: LockBit ByAttackIQ Team June 14, 2023July 21, 2025