Adversary Emulation Attack Graph Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group ByAttackIQ Team May 18, 2023July 21, 2025
Adversary Emulation | Breach and Attack Simulation | US-CERT Alert Response Attack Graph Response to CISA Advisory AA23-129A: Hunting Russian Intelligence “Snake” Malware ByAttackIQ Team May 10, 2023July 21, 2025
Center for Threat-Informed Defense A Year of Impact: AttackIQ’s Applied Research in Threat-Informed Defense ByAttackIQ Team February 27, 2023July 21, 2025
Adversary Emulation | Breach and Attack Simulation | Center for Threat-Informed Defense Democratizing the Practice of Adversary Emulation ByJonathan Reiber February 14, 2023July 21, 2025
Adversary Emulation | Artificial Intelligence | Breach and Attack Simulation | Russia Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing. ByJonathan Reiber December 13, 2022July 21, 2025
Adversary Emulation | Breach and Attack Simulation | Ransomware | US-CERT Alert Response Attack Graph Response to US-CERT Alert (AA22-223A): Testing Security Controls against Zeppelin Ransomware ByKen Towne August 11, 2022July 22, 2025
Adversary Emulation | Cyberattack | Cybercrime | Malware Malware Emulation Attack Graph for SysJoker’s Linux Variant ByAttackIQ Team August 2, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Command and Control | Security Controls OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns ByAttackIQ Team July 11, 2022
Adversary Emulation | MITRE ATT&CK | US-CERT Alert Response Response to US-CERT Alert (AA22-174A): Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems ByAttackIQ Team June 24, 2022July 22, 2025
Adversary Emulation | MITRE ATT&CK | Ransomware Attack Graph Emulating the Conti Ransomware Team’s Behaviors ByAttackIQ Adversary Research Team June 15, 2022July 22, 2025
Adversary Emulation | Cybersecurity “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works. ByJonathan Reiber October 4, 2021
Cybersecurity | Ransomware Is Your Healthcare Organization Following These Four Ransomware Best Practices? ByTracy Cohen August 24, 2021