Adversary Emulation Emulating the Unyielding Scattered Spider ByAyelen Torello May 29, 2025July 29, 2025
Adversary Emulation Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies ByAyelen Torello May 21, 2025July 29, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025July 21, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024July 21, 2025
Adversary Emulation | Iran Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024July 21, 2025
Adversary Emulation Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 ByFrancis Guibernau July 3, 2024July 21, 2025
Adversary Emulation Emulating the Notorious Chinese State-Sponsored Winnti Group ByAyelen Torello June 20, 2024July 21, 2025
#StopRansomware | Ransomware Attack Graph Response to CISA Advisory (AA23-319A): #StopRansomware: Rhysida Ransomware ByAttackIQ Team November 20, 2023July 21, 2025
Adversary Emulation | US-CERT Alert Response Attack Graph Response to CISA Advisory (AA23-263A): #StopRansomware: Snatch Ransomware ByAttackIQ Team October 4, 2023July 21, 2025
Ransomware Emulating the Controversial and Intriguing Rhysida Ransomware ByFrancis Guibernau September 20, 2023July 21, 2025
Adversary Emulation | North Korea Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByAttackIQ Team January 5, 2023July 21, 2025
Cyberattack | Security Control Validation How to Pitch Your CFO on Automated Security Control Validation ByDanielle Murcray July 9, 2021