AttackIQ Blog

    DeepSurface Security Advisory: LPE in Adobe Reader on Windows

    September 16, 2021
    Older versions of Adobe Acrobat Reader are vulnerable to local privilege escalation (LPE) attacks under certain conditions on Windows platforms. This would allow an attacker to perform a local privilege escalation attack against Acrobat Reader users using the same Windows system. Through our responsible disclosure program Adobe was contacted and provided a fix for this issue. Adobe also issued CVE-2021-35982 to track the vulnerability.
    Read More

    Is Your Healthcare Organization Following These Four Ransomware Best Practices?

    August 24, 2021
    Healthcare is the most targeted sector for data breaches, and ransomware attacks were responsible for almost 50 percent of all healthcare data breaches in 2020. How should healthcare companies proceed? Our guest blogger in this ransomware series is Tracy Cohen, a cybersecurity expert with over a decade of experience managing cybersecurity risk in the healthcare and biopharma sector. She is also a licensed skydiver,
    Read More

    20,000 Strong for AttackIQ Academy. And It’s Just the Beginning.

    August 24, 2021
    With over 20,000 students in AttackIQ Academy, our mission is strong as ever to provide a free education on how to build and implement a threat informed defense.
    Read More
    Ransomware: Revealed

    Azure Security Stack Mappings: The Top Native Security Controls for Ransomware

    August 23, 2021
    For the first time, organisations can visually see what Azure security controls can offer in terms of protection, detection and response. With 45 native Azure security control mappings, defenders can start focusing on not only TTPs in the context of Azure threats, but also how each native Azure security control might shield them from related TTPs in Azure.
    Read More

    Standing Up for Our Principles: AttackIQ Signs the Respect In Security

    August 16, 2021
    Read More

    Teamwork Making the Dream Work!

    August 13, 2021
    Why I’m Particularly Proud AttackIQ Made the 2021 Fortune Great Place to Work List
    Read More

    DeepSurface 2.4

    August 13, 2021
    We’re excited to announce our latest version of the DeepSurface product – DeepSurface 2.4. The latest version of our vulnerability management platform expands our reporting capabilities to enable exportable reports to XLSX and PDF to make reporting your vulnerable hosts and missing patches even easier, added support for Thycotic Secret Server PAM, easier setup/administration including emailing of generated reports, and enhancements of our windows agent.
    Read More

    Healthcare Under Siege: Should Hospitals Pay Hackers Ransom?

    August 9, 2021
    In 2020, three of the top 10 most searched terms were, unsurprisingly, healthcare-related. (Coronavirus, coronavirus update, coronavirus symptoms.) We’ve never been so attuned to what’s happening in our healthcare systems and hospitals.
    Read More

    Purple Teaming for Cybersecurity Effectiveness: 10 Lessons

    July 29, 2021
    How do you improve your security posture by standing up a purple team strategy? Here are 10 important things to keep in mind from the Purple Teaming for Dummies eBook.
    Read More

    How purple team operations helped defend the Pentagon — and can help your security team today.

    July 16, 2021
    The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations.
    Read More

    The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided

    July 13, 2021
    On July 2, 2021, the REvil ransomware group successfully exploited a zero-day vulnerability in the on-premise Kaseya VSA server, enabling a wide-scale supply chain cyber attack. Let’s dig in and see how the attack happened, how attack emulation could have helped, and what you can do to implement a threat-informed defense strategy to prepare yourself for similar threat actor behavior.
    Read More

    How to Pitch Your CFO on Automated Security Control Validation

    July 9, 2021
    CFOs are often perceived as gatekeepers to the company’s cash coffers. With different functional leaders vying for project investments, it is true that the role of the CFO is to help prioritize the company’s spend, based on the business growth plan and trajectory.
    Read More