Skip to content

DAR Resources

Whitepaper: Inside Ransomware Negotiations

What goes into threat actor negotiations? Find out with this paper!

Download

Use Case: VIPs

Learn how DRK_MDR can protect executives, public figures, and other high impact people in your organization.

Download

Case Study: Healthcare Records Data Purchase

How The DAR Team found and purchased patient records for sale on a secondary private market

Download

Case Study: Incident Response Rescue

How The DAR Team’s 3-day operation outperformed 2 weeks of traditional IR

Download

Whitepaper: "The Full Monti"

DAR's advanced threat actor attribution helps untangle the knot of sanctions restrictions in ransomware events

Download

Dos and Don'ts of a Ransomware Attack

Your first steps of what to do – and not do – if you find yourself hit by ransomware.

Download

Post-Event Dos and Don'ts

Some helpful reminders about how to move forward (and how not to!) after a ransomware event.

Download

Don't see what you need?

Forgot where you put your asset? It happens all the time. Let us know what you need below and we'll be sure to send it along.