
Reports
Reports
Reports

Decoding the Asahi Brewery Ransomware Attack
This is a compact, evidence-supported analysis of the ransomware attack that disrupted Asahi Group Holdings - one of Japan’s largest beverage manufacturers…
Learn more

Jaguar Land Rover Incident Analysis Report
This is a compact, evidence-driven Incident Analysis Report on the Jaguar Land Rover (JLR) cyber incident (September 2025). It reconstructs the attack timeline…
Learn more

Europe Airports Cyberattack Comprehensive Incident Report
A concise, technical briefing for OT/ICS decision-makers on the recent ransomware event that disrupted check-in systems at multiple European airports. This report reconstructs the attack…
Learn more

Decoding the Asahi Brewery Ransomware Attack
This is a compact, evidence-supported analysis of the ransomware attack that disrupted Asahi Group Holdings - one of Japan’s largest beverage manufacturers…
Learn more

Jaguar Land Rover Incident Analysis Report
This is a compact, evidence-driven Incident Analysis Report on the Jaguar Land Rover (JLR) cyber incident (September 2025). It reconstructs the attack timeline…
Learn more

Europe Airports Cyberattack Comprehensive Incident Report
A concise, technical briefing for OT/ICS decision-makers on the recent ransomware event that disrupted check-in systems at multiple European airports. This report reconstructs the attack…
Learn more

Decoding the Asahi Brewery Ransomware Attack
This is a compact, evidence-supported analysis of the ransomware attack that disrupted Asahi Group Holdings - one of Japan’s largest beverage manufacturers…
Learn more

Jaguar Land Rover Incident Analysis Report
This is a compact, evidence-driven Incident Analysis Report on the Jaguar Land Rover (JLR) cyber incident (September 2025). It reconstructs the attack timeline…
Learn more

Europe Airports Cyberattack Comprehensive Incident Report
A concise, technical briefing for OT/ICS decision-makers on the recent ransomware event that disrupted check-in systems at multiple European airports. This report reconstructs the attack…
Learn more

