AttackIQ Blog

    Preparing for Known Russia-based Cyberthreats Using MITRE ATT&CK and AttackIQ

    March 8, 2022
    To prepare for a potential cyberattack from Russia-based actors, you can begin by testing your security controls against known adversary tactics. The vast majority of cyberattacks use tactics and techniques that have been employed in the past. This blog walks you through key known tactics and techniques, and highlights scenarios in the AttackIQ Security Optimization Platform that you can use today to test your defenses and improve your cybersecurity readiness.
    Read More

    Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats

    February 24, 2022
    In anticipation of escalating cyberattacks by the Russian government against U.S. and allied interests, AttackIQ has developed a new attack graph to help organizations test and validate their cyberdefenses against known Russian adversarial tactics, techniques, and procedures (TTPs).
    Read More
    2021 Impact Report

    The Center for Threat-Informed Defense: Impacting the Public Good

    February 9, 2022
    The Center for Threat-Informed Defense is transforming the practice of cybersecurity and elevating security teams’ performance all over the world. This blog post looks at research highlights from Center’s retrospective 2021 Impact Report, explains why the Center is so important to us at AttackIQ, and shows security teams how to elevate their program performance using a range of free educational resources derived from the Center’s research.
    Read More

    Compliance and Cyber Security Risk Reduction Don’t have to be Enemies

    February 8, 2022
    How to design a Cyber Vulnerability Management program that maximizes the ROI of your team’s work to be compliant and maximize the reduction of business risk at the same time.
    Read More

    The trick to handling ransomware: prepare  

    January 19, 2022
    Ransomware is a vexing challenge and attacks have doubled since 2020, but there is a path out of the problem. In this new guide, Countering Ransomware with MITRE ATT&CK, AttackIQ outlines clear, practical steps to test and validate that your security program performs against ransomware. The trick is to prepare, and the path to follow is a threat-informed defense. Check it out and come join us for a technical demonstration of our ransomware capabilities on January 27.
    Read More
    Boards need to form a dedicated cybersecurity committee that can stay deeply engaged

    The Boardroom Isn’t Ready for the Next SolarWinds

    January 13, 2022
    Attacks like Log4j, SolarWinds and Colonial Pipeline have board rooms across the nation questioning their preparedness in combating cybersecurity risks. What can boards do now to be more effective for the next big attack?
    Read More
    Getting ahead of Log4Shell

    Getting Ahead of Log4Shell-enabled Cyberattacks: New Attack Scenarios and Technical Recommendations

    December 20, 2021
    Read More

    DeepSurface 2.7

    December 15, 2021
    We’re excited to announce the general availability of DeepSurface Risk Analyzer v2.7!  There are a ton of changes under the hood, but we wanted to let you know about a few key improvements.
    Read More
    Log4Shell

    Validate Your Cyberdefenses against Log4Shell with MITRE ATT&CK®

    December 13, 2021
    This article focuses on helping organizations to assess the effectiveness of their compensating controls, enable a threat-informed defense with breach and attack simulation plus the MITRE ATT&CK framework, and interdict the adversary post-breach to drive down risk.
    Read More

    A View of PrintNightmare Through the Lens of Prioritization

    November 29, 2021
    Now that the dust has settled around CVE-2021-34527, also known as PrintNightmare, we thought we’d use it as an example of how DeepSurface can reprioritize even the highest priority vulnerabilities, saving you and your patch team hours of effort.  For this blog post, you don’t need to know anything about PrintNightmare other than it was nearly ubiquitous, there are dozens of exploits in the wild, and that it’s fairly easy to remediate.
    Read More

    Announcing DeepSurface 2.6

    November 16, 2021
    We’re excited to announce the general availability of DeepSurface Risk Analyzer v2.6!  There are a ton of changes under the hood, but we wanted to let you know about a few key improvements.
    Read More
    CVE + Att&ck

    Prioritize and streamline vulnerability management through a threat-informed defense, with new research from the Center for Threat-Informed Defense and the MITRE ATT&CK framework as a foundation.

    October 29, 2021
    Read More

    10 Things You May Not Know About Purple Teaming 

    October 27, 2021
    We’re familiar with red teaming and blue teaming, but have you heard about purple teaming? This blog dives into facts you may not be aware of around this new team construct meant to foster collaboration between red and blue teams for a stronger cybersecurity practice.
    Read More

    Don’t treat cybersecurity hygiene like your car engine light

    October 21, 2021
    ESG has just released the key findings of its cybersecurity hygiene and posture management survey, and in a poll of 400 cybersecurity professionals in North American enterprises, the number one action respondents said would improve cybersecurity hygiene? You guessed it: continuous security control validation.
    Read More

    What To Do in the Case of Brand Reputation Impersonation

    October 15, 2021
    Recently, AttackIQ was notified that an Iranian threat actor had created a fake domain and fraudulent website (attackiq[.]ir) impersonating AttackIQ and abusing the company brand. This blog is an account of what happened and how AttackIQ responded, and it aims to provide insights to help organizations prepare to deal with similar Brand Reputation Abuse situations.
    Read More

    Our message to cybersecurity teams: We’ve got your six.

    October 6, 2021
    The rapid growth in our company isn’t just because we have the best platform for breach and attack simulation (we do). It’s because no other company is as invested as we are in helping you build a threat-informed defense practice that delivers measurable results.
    Read More

    “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works.

    October 4, 2021
    To echo a famous Russian proverb, “trust but verify,” it’s not enough to implement a zero trust architecture. Continuous testing is the only way to achieve real cybersecurity readiness.
    Read More

    Meet AttackIQ Vanguard: Helping security teams identify control gaps before the adversary does.

    September 30, 2021
    As organizations react to constantly changing and challenging situations today, they need to be confident they can still meet their business objectives while controlling risk.
    Read More

    DeepSurface Security Advisory: LPE in Firefox on Windows

    September 28, 2021
    Firefox is vulnerable to local privilege escalation (LPE) attacks under certain conditions on Windows platforms. This would allow an attacker to perform a local privilege escalation attack against Firefox users using the same Windows system. Through our responsible disclosure program Mozilla was contacted, and full technical details were provided, but has ultimately chosen not to fix this vulnerability.
    Read More
    Ransomware: Revealed

    Ransomware and Targeted Attacks in the Healthcare Sector

    September 23, 2021
    Although ransomware can have devastating effects regardless of which industry vertical an organisation is part of, the healthcare industry has particularly paid a heavy price in recent times.
    Read More

    Cloud platforms can stop adversaries. Here’s how. 

    September 22, 2021
    A landmark innovation from MITRE Engenuity’s Center for Threat-Informed Defense maps cloud security controls in AWS and Azure to MITRE ATT&CK®, elevating cybersecurity effectiveness.
    Read More

    DeepSurface Security Advisory: LPE in Adobe Reader on Windows

    September 16, 2021
    Older versions of Adobe Acrobat Reader are vulnerable to local privilege escalation (LPE) attacks under certain conditions on Windows platforms. This would allow an attacker to perform a local privilege escalation attack against Acrobat Reader users using the same Windows system. Through our responsible disclosure program Adobe was contacted and provided a fix for this issue. Adobe also issued CVE-2021-35982 to track the vulnerability.
    Read More

    Is Your Healthcare Organization Following These Four Ransomware Best Practices?

    August 24, 2021
    Healthcare is the most targeted sector for data breaches, and ransomware attacks were responsible for almost 50 percent of all healthcare data breaches in 2020. How should healthcare companies proceed? Our guest blogger in this ransomware series is Tracy Cohen, a cybersecurity expert with over a decade of experience managing cybersecurity risk in the healthcare and biopharma sector. She is also a licensed skydiver,
    Read More

    20,000 Strong for AttackIQ Academy. And It’s Just the Beginning.

    August 24, 2021
    With over 20,000 students in AttackIQ Academy, our mission is strong as ever to provide a free education on how to build and implement a threat informed defense.
    Read More