Select Case File (DRAG TO EXPLORE)
NotPetya
The Most Destructive Cyberattack in History
WannaCry
The NHS Crippler
SolarWinds
The Sunburst Backdoor
Colonial Pipeline
DarkSide Ransomware
Equifax
The Apache Struts Breach
MGM Resorts
Social Engineering Masterclass
Target
The HVAC Vendor Breach
Stuxnet
The First Cyber Weapon
Sony Pictures
The Guardians of Peace
Marriott (Starwood)
The 4-Year Breach
The Kill Chain
A chronological reconstruction of the attack vectors used to compromise the target.
Impact Assessment
Vishing Attack
Attackers impersonate an employee in a call to the IT Help Desk to reset MFA.
Identity Takeover
Attackers gain Okta Super Admin access.
ESXi Encryption
BlackCat ransomware deployed to ESXi hypervisors.
Recovery
Systems slowly restored from backups.
Evidence Board
CONFIDENTIAL // EYES ONLYRANSOM_NOTE.TXT
WALLET ADDRESS
SHA-256 HASH
EXPLOITED VULNERABILITIES
Social EngineeringOktaHow We Would Have Stopped It
Mapping the specific security failures to RadiumFox's preventative services.
The Failure
Weak Help Desk Verification
The Solution
Implement visual verification for help desk requests.
Explore Social Engineering SimulationThe Failure
Over-Privileged Okta Access
The Failure
Flat Network
Join Us. Cut Costs.
Focus on What Matters.
Unlock high-impact penetration testing that drives real security gains. Led by experts, tailored for results, and designed to stay budget-friendly.
Submit Info
Share your environment, scope, or compliance needs via our quick form.
Senior Review
A lead RadiumFox engineer reviews and tailors your assessment—no junior handoffs.
Optional Scoping Call
We'll clarify priorities and technical details if needed.
Clear Quote
Expect a fixed-cost proposal—no hidden fees or fluff.
Fast Kickoff
Once approved, most projects launch within 5–7 business days with full support.