Threat Advisories Response to CISA Advisory (AA25-343A): Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure ByFrancis Guibernau December 10, 2025January 15, 2026
Threat Research Emulating the Destructive Sandworm Adversary ByAyelen Torello November 14, 2025January 15, 2026
Threat Research Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025January 15, 2026
Threat Advisories Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies ByAyelen Torello May 21, 2025January 14, 2026
Threat Research Emulating the Sophisticated Russian Adversary Seashell Blizzard ByAyelen Torello April 2, 2025January 14, 2026
Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025January 14, 2026
Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-249A): Russian Military Cyber Actors Target US and Global Critical Infrastructure ByFrancis Guibernau September 10, 2024January 14, 2026
Threat Advisories Emulating Sandworm’s Prestige Ransomware ByFrancis Guibernau August 2, 2024January 14, 2026
Threat Advisories Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 ByFrancis Guibernau July 3, 2024January 14, 2026
Threat Research Emulating the Sabotage-Focused Russian Adversary Sandworm-Part 1 ByFrancis Guibernau March 6, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-057A): SVR Cyber Actors Adapt Tactics for Initial Cloud Access ByFrancis Guibernau February 27, 2024January 15, 2026
Threat Advisories Response to CISA Advisory (AA23-347A): Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally ByFrancis Guibernau December 21, 2023January 14, 2026
Product & Platform How Does Your Security Stack Up Against Russian Spies? ByCarl Wright August 23, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory AA23-129A: Hunting Russian Intelligence “Snake” Malware ByKen Towne May 10, 2023January 15, 2026
Threat Research Emulating Recent Activity from the Russian Adversary Nobelium / APT29 ByFrancis Guibernau May 4, 2023January 15, 2026
Insights & Perspectives Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing. ByJonathan Reiber December 13, 2022January 14, 2026
Threat Advisories Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022January 14, 2026
Threat Advisories Attack Graph Response to US-CERT AA22-083A: Historical Russia-based Actors Targeting the Energy Sector ByKen Towne April 1, 2022January 15, 2026
Threat Research Testing Network Security Controls against Russian Malware ByKen Towne March 29, 2022January 14, 2026
Threat Advisories Attack Graph Response to US CERT AA22-074A: Russia-based actors disabling multi-factor authentication (MFA) ByKen Towne March 18, 2022January 14, 2026
Threat Advisories Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats ByAdam Moore February 24, 2022January 14, 2026
Insights & Perspectives Data Obfuscation: An Image Is Worth a Thousand Lines of Malware ByOriol Castejón February 16, 2021January 14, 2026
Insights & Perspectives This election year, the health of the Union depends in part on how we safeguard our information ByJonathan Reiber September 23, 2020January 14, 2026