Threat Research

    Cyber Criminals Target “Weakest Link” in the Supply Chain as European Firms Accelerate Digitisation Strategies

    April 30, 2021
    Read More

    Announcing DeepSurface 2.1!

    April 30, 2021
    We’re thrilled to announce DeepSurface 2.1, an improvement on DeepSurface 2.0 that makes it even easier to use. We’ve reorganized some things, added different nomenclature for increased efficiencies allowing you discover and remediate risk even faster.
    Read More

    DeepSurface Security Advisory: Local Privilege Escalation in Octopus Deploy on Windows (CVE-2021-26556)

    April 13, 2021
    Octopus Deploy is a popular DevOps automation platform that enables teams to more efficiently manage configuration, API keys, and permissions. Octopus Server allows users to self-host this platform, and is installed as a service on the host. This service runs as Local System and is a very impactful target for local privilege escalation exploits.
    Read More

    DeepSurface 2.0 — What’s New, and a Peek at What’s Next

    April 6, 2021
    Our mission is to equip cybersecurity teams with the best predictive vulnerability prioritization platform and allow them to quickly identify and reduce more cybersecurity risk every day. To that end, we’re proud to announce the release of DeepSurface 2.0!
    Read More

    DeepSurface Security Advisory: Local Privilege Escalation in Erlang on Windows (CVE-2021-29221)

    April 4, 2021
    Erlang is a popular general-purpose programming language and runtime environment, with support for concurrency commonly found on many distributed systems. When distributed on Windows machines, the Erlang emulator can also be run as a service with the erlsrv.exe command. This seems to be commonly used with popular software, such as CouchDB.
    Read More

    AttackIQ Now Supports Atomic Red Team

    March 17, 2021
    AttackIQ has added Atomic Red Team to our assessment library, bolstering our testing capabilities to further improve our customers’ security effectiveness.
    Read More

    Risky Biz Soap Box: Mapping NIST 800-53 to MITRE ATT&CK

    January 11, 2021
    Read More

    AttackIQ Threat Informed Defense, Vol. 3

    October 26, 2020
    Read More

    Episode 3: Best Practices in Threat-Informed Defense

    August 1, 2020
    Read More

    Episode 1: APT29 and Threat Informed Defense (Pilot)

    July 28, 2020
    Read More

    Purple Teaming Chronicles II: Red-Team Augmentation

    June 30, 2020
    Read More

    Australian Cyber Security Centre (ACSC) Attacker Trends: Useful Information from the Government

    June 16, 2020
    Read More

    Fingerprinting FIN7

    April 20, 2020
    Read More

    Component Object Model Hijacking

    March 26, 2020
    Read More

    Emulating APT29 with AttackIQ

    February 26, 2020
    Read More

    The Hornet’s Nest was just Kicked… What’s Your Move?

    January 8, 2020
    Read More

    Predicting Attack Behavior – Ransomware Patterns Strategic Leaders Need to be Aware of

    June 28, 2019
    Read More

    Improving the Maturity of your Security Program

    June 11, 2019
    Read More

    Bypassing UAC Using Registry Keys

    May 14, 2018
    Read More

    WannaCry Ransomware: Lessons Learned

    May 15, 2017
    Read More

    GameOn! Security Challenge Submission Deadline Extended

    October 19, 2016
    Read More

    Anatomy of a Ransomware Attack

    July 7, 2016
    Read More