diff --git a/docs/content/usage/scenarios/custom-scenario/credential-leak.md b/docs/content/usage/scenarios/custom-scenario/credential-leak.md
index a2cc0b8ce..c5aeced50 100644
--- a/docs/content/usage/scenarios/custom-scenario/credential-leak.md
+++ b/docs/content/usage/scenarios/custom-scenario/credential-leak.md
@@ -9,7 +9,7 @@ weight: 5
## Overview
Numerous attack techniques (from phishing to dumpster diving) might result in a credential leak,
-which can be **extremely costly** as demonstrated in our report [IResponse to IEncrypt](https://www.guardicore.com/2019/04/iresponse-to-iencrypt/).
+which can be **extremely costly** as demonstrated in our report [IResponse to IEncrypt](https://web.archive.org/web/20210117224801/https://www.guardicore.com/2019/04/iresponse-to-iencrypt/).
The Infection Monkey can help you assess the impact of stolen credentials by automatically searching
where bad actors can reuse these credentials in your network.
diff --git a/docs/content/usage/scenarios/custom-scenario/network-breach.md b/docs/content/usage/scenarios/custom-scenario/network-breach.md
index 22fc3b9dc..4d0a6a814 100644
--- a/docs/content/usage/scenarios/custom-scenario/network-breach.md
+++ b/docs/content/usage/scenarios/custom-scenario/network-breach.md
@@ -8,8 +8,8 @@ weight: 3
## Overview
-From the [Hex-Men campaign](https://www.guardicore.com/2017/12/beware-the-hex-men/) that hit
-internet-facing DB servers to a [cryptomining operation that attacks WordPress sites](https://www.guardicore.com/2018/06/operation-prowli-traffic-manipulation-cryptocurrency-mining-2/) or any other malicious campaign – attackers are now trying to go deeper into your network.
+From the [Hex-Men campaign](https://web.archive.org/web/20210115171355/https://www.guardicore.com/2017/12/beware-the-hex-men/) that hit
+internet-facing DB servers to a [cryptomining operation that attacks WordPress sites](https://web.archive.org/web/20210115185135/https://www.guardicore.com/2018/06/operation-prowli-traffic-manipulation-cryptocurrency-mining-2/) or any other malicious campaign – attackers are now trying to go deeper into your network.
Infection Monkey will help you assess the impact of a future breach by attempting to propagate within your internal network using service vulnerabilities, brute-forcing and other safe exploiters.
diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx
index 433e1a75a..fbc51ea89 100644
--- a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx
+++ b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx
@@ -14,7 +14,7 @@ const ATTACK_DESCRIPTION = <>
>