#StopRansomware Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware ByFrancis Guibernau December 23, 2023July 21, 2025
Adversary Emulation | AvosLocker | Ransomware | TTPs | US-CERT Alert | US-CERT Alert Response Attack Graph Response to CISA Advisory (AA23-284A): #StopRansomware: AvosLocker Ransomware ByFrancis Guibernau November 1, 2023July 21, 2025
Adversary Emulation | US-CERT Alert Response Attack Graph Response to CISA Advisory (AA23-263A): #StopRansomware: Snatch Ransomware ByAttackIQ Team October 4, 2023July 21, 2025
Adversary Emulation | Cybercrime | Ransomware Attack Graph Response to CISA Advisory AA23-165A: Understanding Ransomware Threat Actors: LockBit ByAttackIQ Team June 14, 2023July 21, 2025
Adversary Emulation | Ransomware | US-CERT Alert Response Attack Graph Response to US-CERT Alert (AA22-249A): #StopRansomware Vice Society ByAttackIQ Team September 8, 2022July 22, 2025
Adversary Emulation | MITRE ATT&CK | Ransomware Attack Graph Emulating the Conti Ransomware Team’s Behaviors ByAttackIQ Adversary Research Team June 15, 2022July 22, 2025
MITRE ATT&CK | Ransomware | Threat-informed defense | TTPs Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022July 22, 2025
Cybersecurity | Ransomware Is Your Healthcare Organization Following These Four Ransomware Best Practices? ByTracy Cohen August 24, 2021
Ransomware | Threat-informed defense The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided ByAndrew Costis July 13, 2021
Breach and Attack Simulation | Cybersecurity Purple Hats 2021: It was an Event “Brimming” with Cybersecurity Goodness ByJordan McMahon June 24, 2021
Adversary Emulation | Ransomware | TTPs Put MITRE ATT&CK® to work through Workbench ByAndrew Costis June 22, 2021