Adversary Emulation Revisiting the Versatile Qilin Ransomware ByFrancis Guibernau November 19, 2025November 19, 2025
CISA Advisory Updated Response to CISA Advisory (AA24-109A): Akira Ransomware ByFrancis Guibernau November 18, 2025November 19, 2025
Adversary Emulation Emulating the Espionage-Oriented Group SideWinder ByAyelen Torello November 13, 2025November 13, 2025
Adversary Emulation Ransom Tales: Volume V — Throwback Edition! Emulating REvil, DarkSide, and BlackMatter Ransomware ByFrancis Guibernau November 6, 2025November 13, 2025
Adversary Emulation Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025October 16, 2025
Adversary Emulation Emulating the Versatile Qilin Ransomware ByAyelen Torello October 2, 2025October 2, 2025
Adversary Emulation Ransom Tales: Volume IVÂ – Emulating Rhysida, Charon and Dire Wolf Ransomware ByAyelen Torello September 25, 2025September 25, 2025
Ransomware The Evolution of RomCom: From Backdoor to Cyberwar ByFrancis Guibernau September 23, 2025September 23, 2025
Adversary Emulation Ransom Tales: Volume IIIÂ –Â Emulating INC, Lynx and SafePay Ransomware ByFrancis Guibernau August 28, 2025September 15, 2025
Adversary Emulation Emulating the Expedited Warlock Ransomware ByFrancis Guibernau August 27, 2025August 27, 2025
Adversary Emulation Ransom Tales: Volume II – Emulating Gunra, Anubis and DevMan Ransomware ByFrancis Guibernau July 29, 2025August 5, 2025
Adversary Emulation [CISA AA25-203A] #StopRansomware: Interlock ByFrancis Guibernau July 25, 2025August 1, 2025
Adversary Emulation Ransom Tales: Volume I – Emulating BlackLock, Embargo, and Mamona Ransomware ByFrancis Guibernau July 22, 2025July 30, 2025
Adversary Emulation Response to CISA Advisory (AA25-163A): Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider ByIan Rogers June 16, 2025July 30, 2025
Adversary Emulation Updated Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware ByFrancis Guibernau June 12, 2025July 31, 2025
Adversary Emulation Emulating the Blazing DragonForce Ransomware ByFrancis Guibernau May 23, 2025July 29, 2025
Adversary Emulation Emulating the Terrorizing VanHelsing Ransomware ByAyelen Torello May 15, 2025July 29, 2025
Adversary Emulation Emulating the Infestive Termite Ransomware ByFrancis Guibernau May 8, 2025July 29, 2025
Adversary Emulation Emulating the Hellish Helldown Ransomware ByFrancis Guibernau April 24, 2025August 18, 2025
Adversary Emulation Response to CISA Advisory (AA25-071A): #StopRansomware: Medusa Ransomware ByAyelen Torello March 13, 2025July 21, 2025
Adversary Emulation Emulating the Deceptive Akira Ransomware ByFrancis Guibernau February 26, 2025July 31, 2025
#StopRansomware [CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware ByFrancis Guibernau February 20, 2025July 31, 2025
Adversary Emulation Emulating the Splintered Hunters International Ransomware ByFrancis Guibernau January 27, 2025July 31, 2025
Cybersecurity Advisory Response to CISA Advisory (AA25-022A): Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications ByFrancis Guibernau January 24, 2025July 31, 2025