Threat Research Emulating the Systematic LokiLocker Ransomware ByAyelen Torello February 26, 2026February 26, 2026
Threat Research Emulating the Mutative BlackByte Ransomware ByFrancis Guibernau February 25, 2026February 25, 2026
Threat Research Emulating the Elusive Cephalus Ransomware ByAyelen Torello February 5, 2026February 5, 2026
Product & Platform 25 New Adversary Emulation Packages Covering Ransomware and Advisory-Driven Threats ByPaul Reid January 21, 2026January 21, 2026
Threat Research Emulating the Elegant BlackSuit Ransomware ByFrancis Guibernau January 20, 2026January 20, 2026
Threat Research Ransom Tales: Volume VI — Throwback Edition! Emulating Ryuk, Conti, and BlackCat Ransomware ByFrancis Guibernau December 11, 2025January 15, 2026
Threat Research Revisiting the Versatile Qilin Ransomware ByFrancis Guibernau November 19, 2025January 15, 2026
Threat Advisories Updated Response to CISA Advisory (AA24-109A): Akira Ransomware ByFrancis Guibernau November 18, 2025January 15, 2026
Threat Research Emulating the Espionage-Oriented Group SideWinder ByAyelen Torello November 13, 2025January 15, 2026
Threat Research Ransom Tales: Volume V — Throwback Edition! Emulating REvil, DarkSide, and BlackMatter Ransomware ByFrancis Guibernau November 6, 2025January 15, 2026
Threat Research Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025January 15, 2026
Threat Research Emulating the Versatile Qilin Ransomware ByAyelen Torello October 2, 2025January 15, 2026
Threat Research Ransom Tales: Volume IV – Emulating Rhysida, Charon and Dire Wolf Ransomware ByAyelen Torello September 25, 2025January 15, 2026
Threat Research The Evolution of RomCom: From Backdoor to Cyberwar ByFrancis Guibernau September 23, 2025January 15, 2026
Threat Research Ransom Tales: Volume III – Emulating INC, Lynx and SafePay Ransomware ByFrancis Guibernau August 28, 2025January 15, 2026
Threat Research Emulating the Expedited Warlock Ransomware ByFrancis Guibernau August 27, 2025January 15, 2026
Threat Research Ransom Tales: Volume II – Emulating Gunra, Anubis and DevMan Ransomware ByFrancis Guibernau July 29, 2025January 15, 2026
Threat Advisories [CISA AA25-203A] #StopRansomware: Interlock ByFrancis Guibernau July 25, 2025January 14, 2026
Threat Research Ransom Tales: Volume I – Emulating BlackLock, Embargo, and Mamona Ransomware ByFrancis Guibernau July 22, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA25-163A): Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider ByIan Rogers June 16, 2025January 14, 2026
Threat Advisories Updated Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware ByFrancis Guibernau June 12, 2025January 14, 2026
Threat Research Emulating the Blazing DragonForce Ransomware ByFrancis Guibernau May 23, 2025January 14, 2026
Threat Research Emulating the Terrorizing VanHelsing Ransomware ByAyelen Torello May 15, 2025January 14, 2026
Threat Research Emulating the Infestive Termite Ransomware ByFrancis Guibernau May 8, 2025January 14, 2026