Adversary Emulation Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies ByAyelen Torello May 21, 2025July 29, 2025
Adversary Emulation Emulating the Sophisticated Russian Adversary Seashell Blizzard ByAyelen Torello April 2, 2025July 21, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025July 21, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-249A): Russian Military Cyber Actors Target US and Global Critical Infrastructure ByFrancis Guibernau September 10, 2024July 21, 2025
Adversary Emulation Emulating Sandworm’s Prestige Ransomware ByFrancis Guibernau August 2, 2024July 21, 2025
Adversary Emulation Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 ByFrancis Guibernau July 3, 2024July 21, 2025
Adversary Emulation Emulating the Sabotage-Focused Russian Adversary Sandworm-Part 1 ByFrancis Guibernau March 6, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA24-057A): SVR Cyber Actors Adapt Tactics for Initial Cloud Access ByAttackIQ Team February 27, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA23-347A): Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally ByFrancis Guibernau December 21, 2023July 21, 2025
AttackIQ Flex | Breach and Attack Simulation | Cybersecurity | Cybersecurity Education | Leadership | Security Control Validation How Does Your Security Stack Up Against Russian Spies? ByCarl Wright August 23, 2023July 21, 2025
Adversary Emulation | Breach and Attack Simulation | US-CERT Alert Response Attack Graph Response to CISA Advisory AA23-129A: Hunting Russian Intelligence “Snake” Malware ByAttackIQ Team May 10, 2023July 21, 2025