Most Recent

Target Locked: Operation Sharpshooter

Operation Sharpshooter was a significant cyberattack by the Lazarus Group, targeting critical industries like finance, energy, and defense. Dive into the details of the attack and its implications and explore how AttackIQ Flex can assist in testing and strengthening your cybersecurity defenses.

Intercept the Adversary: Lazarus Group – Operation In(ter)ception

Operation In(ter)ception reveals Lazarus Group's 2019 cyber campaign targeting military and aerospace organizations in Europe and the Middle East. Delve into the attacker's tactics on LinkedIn, their covert infiltration methods, and the complexities of their persistence strategies. Discover how AttackIQ Flex can empower your organization to fortify their defenses against such sophisticated threats through the use of agentless emulation testing.

Beneath the Shadows: DarkGate

Join us as we uncover DarkGate, a malevolent force that strikes fear into the hearts of organizations worldwide. DarkGate has morphed into a sophisticated adversary, utilizing Drive-by Downloads and DanaBot deployment to wreak havoc. But fear not! With AttackIQ Flex at your side, you'll be equipped to wage war against these digital demons and emerge victorious in the fight for cybersecurity supremacy.

Response to CISA Advisory (AA24-060B): Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways

In response to the recently published CISA Advisory (AA24-060B) that disseminates observed threat actor activities, Indicators of Compromise (IOCs), and mitigations associated with ongoing incident response activities in connection with the recent Ivanti Connect Secure and Ivanti Policy Secure Gateway vulnerabilities CVE-2023-46805, CVE-2024-21887 and CVE-2024-21893, AttackIQ recommends that customers take the following testing actions in alignment with this recently observed activity.

Response to CISA Advisory (AA24-057A): SVR Cyber Actors Adapt Tactics for Initial Cloud Access

AttackIQ recommends that customers take the following testing actions in alignment to the recently published CISA Advisory (AA24-057A) which details recent Tactics, Techniques, and Procedures (TTPs) exhibited by the Russian Foreign Intelligence Service (SVR) adversary known as APT29 during activities in which it sought to gain initial access to the cloud infrastructure of government entities and corporations.

Response to an Unknown Threat Actor Who Leveraged a Compromised Account to Access State Government Organization

In response to the recently published CISA Advisory (AA24-046A) that disseminates Tactics, Techniques, Procedures (TTPs) and mitigations associated with a recent incident response assessment of a state government organization’s network, AttackIQ recommends that customers take the following testing actions in alignment with this recently observed activity.