Threat Research Emulating the Terrorizing VanHelsing Ransomware ByAyelen Torello May 15, 2025January 14, 2026
Threat Research Emulating the Infestive Termite Ransomware ByFrancis Guibernau May 8, 2025January 14, 2026
Threat Research Emulating the Hellish Helldown Ransomware ByFrancis Guibernau April 24, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA25-071A): #StopRansomware: Medusa Ransomware ByAyelen Torello March 13, 2025January 14, 2026
Threat Research Emulating the Deceptive Akira Ransomware ByFrancis Guibernau February 26, 2025January 14, 2026
Threat Advisories [CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware ByFrancis Guibernau February 20, 2025January 14, 2026
Threat Research Emulating the Splintered Hunters International Ransomware ByFrancis Guibernau January 27, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA25-022A): Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications ByFrancis Guibernau January 24, 2025January 14, 2026
Threat Advisories Updated Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group ByAyelen Torello January 16, 2025January 14, 2026
Threat Research Emulating the Tenacious Ako Ransomware ByFrancis Guibernau January 9, 2025January 14, 2026
Threat Advisories Emulating the Petrifying Medusa Ransomware ByFrancis Guibernau September 19, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-242A): #StopRansomware: RansomHub Ransomware ByFrancis Guibernau September 5, 2024January 14, 2026
Threat Advisories Emulating the Extortionist Mallox Ransomware ByFrancis Guibernau August 30, 2024January 14, 2026
Threat Advisories Emulating Sandworm’s Prestige Ransomware ByFrancis Guibernau August 2, 2024January 14, 2026
Threat Advisories Emulating the Prickly Cactus Ransomware ByFrancis Guibernau July 25, 2024January 14, 2026
Threat Advisories Emulating the Long-Term Extortionist Nefilim Ransomware ByFrancis Guibernau July 11, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware ByFrancis Guibernau June 5, 2024January 14, 2026
Product & Platform Defend Your Business: Testing Your Security Against QakBot and Black Basta Ransomware ByMadison Steel May 29, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta ByFrancis Guibernau May 17, 2024January 14, 2026
Threat Advisories Response to ScreenConnect’s Recent Zero-day Vulnerability Exploitation ByFrancis Guibernau March 8, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware ByFrancis Guibernau March 1, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware ByFrancis Guibernau December 23, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-284A): #StopRansomware: AvosLocker Ransomware ByFrancis Guibernau November 1, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-263A): #StopRansomware: Snatch Ransomware ByFrancis Guibernau October 4, 2023January 15, 2026