Author: Adam Moore

Adam Moore has joined AttackIQ as Head of R&D for threat emulation content with 16yrs experience doing operational network defense, threat intelligence, incident response and active cyber defense/counter-threat operations, with an overlapping and sizable subset of that time also designing and doing insider threat monitoring and consulting on cyber research projects for government and military customers. He has also led security technology implementation projects, closely supported CISOs for many years by advising, reporting and acting in their places, and much more. He has defended the U.S. Army's networks in Europe, the distributed nuclear weapons complex, the A- and J-root DNS delegation authority and backend registry operator for .com/.net/.gov (and other TLDs) for the Internet, and a non-profit think-tank highly-targeted by espionage operators from multiple countries.

    Testing your defenses against CVE-2022-30190: MSDT “Follina” 0-Day 

    June 2, 2022
    AttackIQ has released a new scenario to test your security controls against exploits used in the Follina 0-day. This new scenario helps security teams validate visibility, patching, security controls, and logging in their environments relative to this pervasive 0-day vulnerability. Elevate your security program performance using AttackIQ.
    Read More
    Blog Image for US Cert Alert AA22-152A

    Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group 

    June 2, 2022
    AttackIQ has released a new scenario and assessment in response to US-CERT Alert AA22-152A, Karakurt Data Extortion Group 
    Read More

    Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats

    February 24, 2022
    In anticipation of escalating cyberattacks by the Russian government against U.S. and allied interests, AttackIQ has developed a new attack graph to help organizations test and validate their cyberdefenses against known Russian adversarial tactics, techniques, and procedures (TTPs).
    Read More