Adversary Emulation Emulating the Tenacious Ako Ransomware ByAyelen Torello January 9, 2025July 21, 2025
Adversary Emulation Emulating the Petrifying Medusa Ransomware ByFrancis Guibernau September 19, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-242A): #StopRansomware: RansomHub Ransomware ByFrancis Guibernau September 5, 2024July 21, 2025
Adversary Emulation Emulating the Extortionist Mallox Ransomware ByFrancis Guibernau August 30, 2024July 21, 2025
Adversary Emulation Emulating Sandworm’s Prestige Ransomware ByFrancis Guibernau August 2, 2024July 21, 2025
Adversary Emulation Emulating the Prickly Cactus Ransomware ByFrancis Guibernau July 25, 2024July 21, 2025
Adversary Emulation Emulating the Long-Term Extortionist Nefilim Ransomware ByFrancis Guibernau July 11, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware ByFrancis Guibernau June 5, 2024July 21, 2025
AttackIQ Flex Defend Your Business: Testing Your Security Against QakBot and Black Basta Ransomware ByMadison Steel May 29, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta ByFrancis Guibernau May 17, 2024July 21, 2025
Adversary Emulation Response to ScreenConnect’s Recent Zero-day Vulnerability Exploitation ByFrancis Guibernau March 8, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware ByFrancis Guibernau March 1, 2024July 21, 2025