Iran Iranian Cyber Threat Escalation: Preparing for Asymmetric Response through Adversarial Validation Emulation ByPaul Reid June 23, 2025July 29, 2025
Adversary Emulation | Iran Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-241A): Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations ByAyelen Torello August 29, 2024July 21, 2025
Adversary Emulation | MITRE ATT&CK | US-CERT Alert Response Attack Graph Response to US-CERT Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Ransom Operations ByAttackIQ Team September 16, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Command and Control | Security Controls OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns ByAttackIQ Team July 11, 2022
Security Controls AttackIQ Includes MITRE ATT&CK’s New Sub-Techniques for Customers ByJonathan Reiber July 7, 2020
Security Controls NASA JPL Breaches – A Reminder of Basic Cyber Security Hygiene ByStephan Chenette June 24, 2019