Threat Advisories Response to CISA Advisory (AA25-239A): Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System ByAyelen Torello September 4, 2025January 15, 2026
Threat Research Emulating the Unyielding Scattered Spider ByAyelen Torello May 29, 2025January 14, 2026
Threat Research Emulating the Sophisticated Russian Adversary Seashell Blizzard ByAyelen Torello April 2, 2025January 14, 2026
Threat Research Emulating the Sophisticated Chinese Adversary Salt Typhoon ByFrancis Guibernau March 19, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-038A): PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure ByFrancis Guibernau February 9, 2024January 15, 2026
Product & Platform Tainted Defenses: Emulating Gallium’s Operation Tainted Love ByNick Desler November 20, 2023January 14, 2026
Threat Research Emulating the Highly Elusive Chinese Adversary Gallium ByAttackIQ Team July 28, 2023January 15, 2026
Threat Research Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByFrancis Guibernau January 5, 2023January 15, 2026