SNSSimple Network Solutions
Threat Intelligence

Threat Actor
Encyclopedia

Dedicated profiles on the most consequential cybercriminal and nation-state threat actors of the past decade — their history, techniques, notable attacks, and every related article in our archive.

6

Threat Actors Profiled

4 Active

Currently Operating

32+

Notable Attacks Documented

20

Related Blog Posts

Showing 6 of 6 threat actors

About This Encyclopedia

Profiles are compiled from public threat intelligence reports, CISA advisories, FBI joint advisories, and our own analysis of documented incidents. MITRE ATT&CK technique IDs are provided for reference.

Continuously Updated

Threat actor profiles are updated as new incidents are documented and new blog posts are published. The threat landscape evolves — so does this encyclopedia.

SMB-Focused Defense

Defense guidance is specifically calibrated for small and mid-size businesses — not enterprise security teams with unlimited budgets. Practical, prioritized, and actionable.

SMB Defense Playbook

How to Protect Your Business
Step by Step

Every threat actor profiled above has successfully breached organizations that believed they were protected. These 22 steps — organized into three phases — close the specific attack paths they use. Start with Phase 1 today.

Do these first. Each one closes a door that ransomware groups and social engineers walk through every day.

Not Sure Where Your Business Stands?

SNS offers a free IT security assessment for Miami-area businesses. We review your current defenses against the specific techniques used by the threat actors above and give you a prioritized action plan — no obligation.

Security Score Self-Assessment

Check off what your business has completed

Phase 1 — 0/7 complete
Phase 2 — 0/8 complete
Phase 3 — 0/7 complete
0
/ 100

Not Started

Begin with Phase 1 steps immediately

Progress Breakdown

Phase 10/35 pts
Phase 20/39 pts
Phase 30/30 pts
Steps completed0 / 22
Get a Free Security Audit

SNS will review your gaps and give you a written action plan — free, no obligation.

Is Your Business Protected Against These Threats?

Every actor profiled here has successfully breached organizations that believed they were adequately protected. A free IT security assessment from Simple Network Solutions takes 30 minutes and tells you exactly where you stand.