Adversary Emulation | Russia Emulating Recent Activity from the Russian Adversary Nobelium / APT29 ByAttackIQ Team May 4, 2023July 21, 2025
Adversary Emulation | Artificial Intelligence | Breach and Attack Simulation | Russia Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing. ByJonathan Reiber December 13, 2022July 21, 2025
MITRE ATT&CK | Ransomware | Threat-informed defense | TTPs Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Malware | Russia Attack Graph Response to US-CERT AA22-083A: Historical Russia-based Actors Targeting the Energy Sector ByKen Towne April 1, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Russia Testing Network Security Controls against Russian Malware ByKen Towne March 29, 2022
Adversary Emulation | Cyberattack | Cybersecurity | Russia | TTPs Attack Graph Response to US CERT AA22-074A: Russia-based actors disabling multi-factor authentication (MFA) ByKen Towne March 18, 2022July 22, 2025
Adversary Emulation | Russia | Security Control Validation | US-CERT Alert Response Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats ByAdam Moore February 24, 2022July 22, 2025
Command and Control | Security Controls Data Obfuscation: An Image Is Worth a Thousand Lines of Malware ByOriol Castejón February 16, 2021
Cyberattack This election year, the health of the Union depends in part on how we safeguard our information ByJonathan Reiber September 23, 2020
Cyberattack What Security Teams Can Learn from the Attacks on Twitter and COVID-19 Researchers ByChris Kennedy July 23, 2020
Security Controls AttackIQ Includes MITRE ATT&CK’s New Sub-Techniques for Customers ByJonathan Reiber July 7, 2020