AttackIQ Blog

    DeepSurface 2.0 — What’s New, and a Peek at What’s Next

    April 6, 2021
    Our mission is to equip cybersecurity teams with the best predictive vulnerability prioritization platform and allow them to quickly identify and reduce more cybersecurity risk every day. To that end, we’re proud to announce the release of DeepSurface 2.0!
    Read More

    DeepSurface Security Advisory: Local Privilege Escalation in Erlang on Windows (CVE-2021-29221)

    April 4, 2021
    Erlang is a popular general-purpose programming language and runtime environment, with support for concurrency commonly found on many distributed systems. When distributed on Windows machines, the Erlang emulator can also be run as a service with the erlsrv.exe command. This seems to be commonly used with popular software, such as CouchDB.
    Read More

    A Next Step “On The Road” (to Security Optimization)

    March 23, 2021
    AttackIQ’s new architecture upgrade makes it possible for customers to emulate comprehensive, multi-stage adversary cyberattack campaigns with realism and specificity, at every step in the kill chain. Check it out.
    Read More

    AttackIQ Now Supports Atomic Red Team

    March 17, 2021
    AttackIQ has added Atomic Red Team to our assessment library, bolstering our testing capabilities to further improve our customers’ security effectiveness.
    Read More

    In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass

    February 23, 2021
    After SolarWinds, organizations need visibility into their security program effectiveness against real world threats. Automated adversary emulations can help meet that need. By generating real data about how your security program performs against menuPass, you can see security failures, make data-informed adjustments, and plan smart investments to optimize your security. Check out the new emulation plan from MITRE Engenuity’s Center for Threat-Informed Defense and AttackIQ.
    Read More

    Data Obfuscation: An Image Is Worth a Thousand Lines of Malware

    February 16, 2021
    Adversaries love to hide malware in images, a tactic called data obfuscation. To help you solve this problem, at AttackIQ we have built scenarios to test your defensive capabilities’ ability to detect and prevent image-based malware. Read on to learn how it works – and how you can obfuscate data on your own to test your defenses.
    Read More

    GAO Finds Gaps in DoD Cyberdefenses, Highlights Importance of Breach and Attack Simulation Tools

    February 8, 2021
    AttackIQ’s Security Optimization Platform gives an agency a proactive—rather than a reactive—security posture. It enables continuous validation of security controls to definitively establish the effectiveness of key initiatives, to include zero-trust controls that prevent adversaries from moving laterally across a network, as in the case of SolarWinds.
    Read More

    AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity

    January 12, 2021
    Read More

    Risky Biz Soap Box: Mapping NIST 800-53 to MITRE ATT&CK

    January 11, 2021
    Read More

    Lions and Tigers and a December Full of Adversary Activity – Oh My!

    December 23, 2020
    Defensive technologies can provide meaningful capabilities to isolate the adversary from compromised systems as defenders and threat hunters inspect their networks, preventing further reconnaissance and lateral movement, but only if their effectiveness is tested and validated.
    Read More

    “In God we trust. All others must bring data.”

    December 16, 2020
    Read More

    Grandpa’s New Shoes—or How Compliance Learned to Love Adversary Emulation

    December 15, 2020
    The alignment of NIST 800-53 and MITRE ATT&CK creates a unique opportunity for red, blue, and white teams to understand each other—and how they can work together to build a fully compliant and mature cybersecurity program.
    Read More

    Innovating During COVID-19 to Improve Security Effectiveness

    December 1, 2020
    Read More

    Five ways to lock down security control validation

    November 12, 2020
    Simple and important steps to make your cybersecurity program more efficient and effective.
    Read More

    AttackIQ Threat Informed Defense, Vol. 3

    October 26, 2020
    Read More

    AttackIQ Named one of the 2020 Best Small & Medium Workplaces™ by Great Place to Work® and Fortune

    October 16, 2020
    Read More

    Time to prepare for increased U.S.-China tensions in cyberspace 

    October 5, 2020
    Last week, the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) issued an alert to critical infrastructure owners and operators across the United States to be vigilant for potential Chinese cyberspace operations given heightened tensions between the two countries. What does the CISA alert recommend, and why is it important to follow it? 
    Read More

    This election year, the health of the Union depends in part on how we safeguard our information 

    September 23, 2020
    Cybersecurity does not exist in a vacuum and current socio-economic pressures make the United States more vulnerable to cyberattacks of all kinds. With the U.S. presidential election underway, Americans need to take practical steps to defend our democratic processes, online and off. This essay outlines some of the issues facing the United States in advance of the election, shares insights from AttackIQ’s recent podcast with leaders of Harvard’s Defending Digital Democracy project, and offers specific steps to manage the cybersecurity challenges of this moment.
    Read More

    A historic plan, built for the public.

    September 15, 2020
    Read More

    Episode 4: FIN6 MITRE Emulation Plan

    September 15, 2020
    Read More

    Countering ransomware with AttackIQ’s Security Optimization Platform

    August 19, 2020
    Ransomware is on the rise, particularly against city government and hospitals. In advance of the 2020 U.S. presidential election, how does the AttackIQ Security Optimization Platform help businesses to defend themselves?
    Read More

    AttackIQ’s business is not security testing.

    August 3, 2020
    If you know AttackIQ, you probably know us as the leading independent vendor of Breach & Attack Simulation systems. We build the best security control validation solution available. So how is it that I say our business is not security testing?
    Read More

    Episode 3: Best Practices in Threat-Informed Defense

    August 1, 2020
    Read More

    Episode 2: How to Achieve Cybersecurity Effectiveness

    July 30, 2020
    Read More