Threat Research Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025January 15, 2026
Threat Research Emulating the Expedited Warlock Ransomware ByFrancis Guibernau August 27, 2025January 15, 2026
Threat Research Emulating the Terrorizing VanHelsing Ransomware ByAyelen Torello May 15, 2025January 14, 2026
Threat Research Emulating the Relentless RansomHub Ransomware ByAyelen Torello March 6, 2025January 14, 2026
Threat Research Emulating the Deceptive Akira Ransomware ByFrancis Guibernau February 26, 2025January 14, 2026
Threat Research Emulating the Splintered Hunters International Ransomware ByFrancis Guibernau January 27, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA25-022A): Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications ByFrancis Guibernau January 24, 2025January 14, 2026
Threat Advisories Emulating the Petrifying Medusa Ransomware ByFrancis Guibernau September 19, 2024January 14, 2026
Threat Advisories Emulating the Long-Term Extortionist Nefilim Ransomware ByFrancis Guibernau July 11, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA23-353A): #StopRansomware: ALPHV BlackCat ByFrancis Guibernau December 29, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory AA23-165A: Understanding Ransomware Threat Actors: LockBit ByFrancis Guibernau June 14, 2023January 15, 2026