Emulating the Terrorizing VanHelsing Ransomware

AttackIQ has released a new attack graph emulating the behaviors exhibited by VanHelsing ransomware, a new and rapidly growing ransomware-as-a-service (RaaS) affiliate program that emerged in March 2025. This emulation enables defenders ...
medusa, Snowflake data breach hacker arrested

Medusa Ransomware: Inside the 2025 Resurgence of One of the Internet’s Most Aggressive Threats 

Medusa: Its operations, the main factor driving its recent resurgence, which has led to warnings issued by global authorities, its targets and why it’s so dangerous ...
Security Boulevard

Emulating the Relentless RansomHub Ransomware

AttackIQ has released a new attack graph emulating the behaviors exhibited by RansomHub ransomware since its emergence in February 2024. This sophisticated ransomware employs double extortion techniques and shares notable similarities with ...

Emulating the Deceptive Akira Ransomware

AttackIQ has released a new attack graph emulating the behaviors exhibited by Akira ransomware since its emergence in March 2023. Akira operators provide victims the option to pay for either file decryption ...

Emulating the Splintered Hunters International Ransomware

AttackIQ has released a new attack graph emulating the behaviors exhibited by Hunters International ransomware since its discovery in October 2023. Technical analysis suggests a realistic possibility that Hunters International may have ...

Emulating the Splintered Hunters International Ransomware

AttackIQ has released a new attack graph emulating the behaviors exhibited by Hunters International ransomware since its discovery in October 2023. Technical analysis suggests a realistic possibility that Hunters International may have ...

Response to CISA Advisory (AA25-022A): Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

AttackIQ has released a new assessment template in response to the CISA Advisory (AA25-022A) published on January 22, 2025, which details the exploitation of vulnerabilities discovered in Ivanti Cloud Service Appliances during ...

Response to CISA Advisory (AA25-022A): Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

AttackIQ has released a new assessment template in response to the CISA Advisory (AA25-022A) published on January 22, 2025, which details the exploitation of vulnerabilities discovered in Ivanti Cloud Service Appliances during ...

Emulating the Petrifying Medusa Ransomware

AttackIQ has released a new attack graph that emulates the behaviors exhibited by Medusa ransomware since the beginning of its activities in June 2021. Medusa is predominantly propagated through the exploitation of ...
ransomware, attacks, Rubrik, cybersecurity, Ransomware, attacks, payment, RaaS, ransomware, attack, healthcare

Strengthening Security Posture in the World of Outsourced Ransomware-as-a-Service (RaaS)

These proactive defense measures - vulnerability management, MFA and EDR - remain critical in the ongoing battle against RaaS groups and bad actors ...
Security Boulevard