Current Papers
A Pragmatic Approach to Threat Hunting
A discussion of best practices and methodologies. Most companies believe they are prepared to detect, respond to, and contain an advanced threat. However, are we prepared for hunting and implementing proactive response methodologies for artifacts that cyber attack groups use?

rThreat Datasheet
Review the rThreat datasheet to learn more about our platform
Features and scope of rThreat.
Read Our Blog
Latest Posts
John Kindervag, Creator of Zero Trust, Joins rThreat
rThreat announced today that cybersecurity expert and Zero Trust creator John Kindervag will join their team as an advisor.
rThreat Snags Mr. Wonderful’s Stamp of Approval
rThreat, the first breach and attack emulation platform that challenges cyber defenses using real world and custom threats in a secure environment, wowed Kevin O’Leary, Shark Tank’s Mr. Wonderful, and took first place in StartEngine’s quarterly pitch competition.
rThreat Adversary Spotlight: Blackmatter Ransomware
BlackMatter Ransomware was presented on the cyber underground forums on July 21, 2021. Learn more on how Blackmatter works.