Author: Adam Moore
Adam Moore has joined AttackIQ as Head of R&D for threat emulation content with 16yrs experience doing operational network defense, threat intelligence, incident response and active cyber defense/counter-threat operations, with an overlapping and sizable subset of that time also designing and doing insider threat monitoring and consulting on cyber research projects for government and military customers. He has also led security technology implementation projects, closely supported CISOs for many years by advising, reporting and acting in their places, and much more. He has defended the U.S. Army's networks in Europe, the distributed nuclear weapons complex, the A- and J-root DNS delegation authority and backend registry operator for .com/.net/.gov (and other TLDs) for the Internet, and a non-profit think-tank highly-targeted by espionage operators from multiple countries.
June 2, 2022
AttackIQ has released a new scenario to test your security controls against exploits used in the Follina 0-day. This new scenario helps security teams validate visibility, patching, security controls, and logging in their environments relative to this pervasive 0-day vulnerability. Elevate your security program performance using AttackIQ.
June 2, 2022
AttackIQ has released a new scenario and assessment in response to US-CERT Alert AA22-152A, Karakurt Data Extortion Group
February 24, 2022
In anticipation of escalating cyberattacks by the Russian government against U.S. and allied interests, AttackIQ has developed a new attack graph to help organizations test and validate their cyberdefenses against known Russian adversarial tactics, techniques, and procedures (TTPs).



