Threat Research Emulating the Splintered Hunters International Ransomware ByFrancis Guibernau January 27, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA25-022A): Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications ByFrancis Guibernau January 24, 2025January 14, 2026
Threat Advisories Updated Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group ByAyelen Torello January 16, 2025January 14, 2026
Threat Research Emulating the Tenacious Ako Ransomware ByFrancis Guibernau January 9, 2025January 14, 2026
Threat Advisories Emulating the Petrifying Medusa Ransomware ByFrancis Guibernau September 19, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-242A): #StopRansomware: RansomHub Ransomware ByFrancis Guibernau September 5, 2024January 14, 2026
Threat Advisories Emulating the Extortionist Mallox Ransomware ByFrancis Guibernau August 30, 2024January 14, 2026
Threat Advisories Emulating Sandworm’s Prestige Ransomware ByFrancis Guibernau August 2, 2024January 14, 2026
Threat Advisories Emulating the Prickly Cactus Ransomware ByFrancis Guibernau July 25, 2024January 14, 2026
Threat Advisories Emulating the Long-Term Extortionist Nefilim Ransomware ByFrancis Guibernau July 11, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware ByFrancis Guibernau June 5, 2024January 14, 2026
Product & Platform Defend Your Business: Testing Your Security Against QakBot and Black Basta Ransomware ByMadison Steel May 29, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta ByFrancis Guibernau May 17, 2024January 14, 2026
Threat Advisories Response to ScreenConnect’s Recent Zero-day Vulnerability Exploitation ByFrancis Guibernau March 8, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware ByFrancis Guibernau March 1, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware ByFrancis Guibernau December 23, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-284A): #StopRansomware: AvosLocker Ransomware ByFrancis Guibernau November 1, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-263A): #StopRansomware: Snatch Ransomware ByFrancis Guibernau October 4, 2023January 15, 2026
Threat Advisories Attack Graph Response to CISA Advisory AA23-165A: Understanding Ransomware Threat Actors: LockBit ByFrancis Guibernau June 14, 2023January 15, 2026
Threat Advisories Attack Graph Response to US-CERT Alert (AA22-249A): #StopRansomware Vice Society ByFrancis Guibernau September 8, 2022January 15, 2026
Threat Research Attack Graph Emulating the Conti Ransomware Team’s Behaviors ByAttackIQ Adversary Research Team June 15, 2022January 14, 2026
Threat Advisories Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022January 14, 2026
Insights & Perspectives The trick to handling ransomware: prepare ByJonathan Reiber January 19, 2022January 14, 2026
Insights & Perspectives Is Your Healthcare Organization Following These Four Ransomware Best Practices? ByTracy Cohen August 24, 2021January 14, 2026