Adversary Emulation Response to CISA Advisory (AA25-163A): Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider ByIan Rogers June 16, 2025July 29, 2025
Adversary Emulation Response to CISA Advisory (AA25-141B): Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations ByFrancis Guibernau May 22, 2025July 29, 2025
Adversary Emulation Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies ByAyelen Torello May 21, 2025July 29, 2025
Adversary Emulation Response to CISA Advisory (AA25-071A): #StopRansomware: Medusa Ransomware ByAyelen Torello March 13, 2025July 21, 2025
#StopRansomware [CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware ByFrancis Guibernau February 20, 2025July 21, 2025
Cybersecurity Advisory Response to CISA Advisory (AA25-022A): Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications ByFrancis Guibernau January 24, 2025July 21, 2025
Adversary Emulation | Iran Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-249A): Russian Military Cyber Actors Target US and Global Critical Infrastructure ByFrancis Guibernau September 10, 2024July 21, 2025
AttackIQ CISA and NSA’s Top 10 Control Misconfigurations? Use BAS and MITRE ATT&CK to Defend Against Them ByAttackIQ Team December 12, 2023July 21, 2025
Security Controls The U.S. Government Needs to Overhaul Cybersecurity. Here’s How. ByJonathan Reiber April 9, 2021
Security Control Validation Before the Election, States Need to Test their Cybersecurity Continuously ByJonathan Reiber June 4, 2020