threatintel
actor tracker
Named attacks · kill-chain walkthroughs

Anatomy of the attacks the industry keeps coming back to

Each page is a scrollytelling kill chain: a custom diagram on the left animates phase by phase as you scroll through the narrative on the right. Every claim cites the primary source — CISA advisories, MITRE ATT&CK, and the vendor disclosure that originally surfaced the activity. No fabrication.