Adversary Emulation Emulating the Sophisticated Chinese Adversary Salt Typhoon ByFrancis Guibernau March 19, 2025July 21, 2025
#StopRansomware [CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware ByFrancis Guibernau February 20, 2025July 21, 2025
Adversary Emulation Emulating the Notorious Chinese State-Sponsored Winnti Group ByAyelen Torello June 20, 2024July 21, 2025
Adversary Emulation Emulating the Open-Source Remote Access Trojan (RAT) AsyncRAT ByAyelen Torello May 24, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta ByFrancis Guibernau May 17, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-016A): Known Indicators of Compromise Associated with Androxgh0st Malware ByFrancis Guibernau January 19, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA23-353A): #StopRansomware: ALPHV BlackCat ByFrancis Guibernau December 29, 2023July 21, 2025
#StopRansomware Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware ByFrancis Guibernau December 23, 2023July 21, 2025
Adversary Emulation Response to CISA Advisory (AA23-349A): Enhancing Cyber Resilience: Insights from the CISA Healthcare and Public Health Sector Risk and Vulnerability Assessment ByAndrew Costis December 22, 2023July 21, 2025
Adversary Emulation Response to CISA Advisory (AA23-320A): Scattered Spider ByAttackIQ Team November 21, 2023July 21, 2025
Adversary Emulation | AvosLocker | Ransomware | TTPs | US-CERT Alert | US-CERT Alert Response Attack Graph Response to CISA Advisory (AA23-284A): #StopRansomware: AvosLocker Ransomware ByFrancis Guibernau November 1, 2023July 21, 2025
Adversary Emulation | Ransomware | TTPs Put MITRE ATT&CK® to work through Workbench ByAndrew Costis June 22, 2021