Security Control Validation

    Securing Remote Networks with AttackIQ Flex

    September 7, 2023
    The rise of remote work, branch networks, and the entwining of IoT and OT systems have created vast network footprints, making identifying vulnerabilities more challenging than ever. Cyber threats loom large, and with the stakes higher than ever, ensuring your defenses are impervious is paramount.
    Read More
    Nobelium / APT29 Background

    Enhancing M&A Security Control Validation with AttackIQ Flex

    August 31, 2023
    In a world where time is a precious resource, AttackIQ Flex ensures your security controls are prepared for the challenges posed by M&A and remote network integrations.
    Read More
    Flex Package - Turla Background Image

    How Does Your Security Stack Up Against Russian Spies?

    August 23, 2023
    The implications of not conducting security control testing are profound. Adversaries are relentless and will exploit vulnerabilities if given the chance. The potential impact includes data breaches, financial losses, damage to reputation, and regulatory penalties.
    Read More

    Attack Graph Response to CISA Advisory (AA23-061A): #StopRansomware: Royal Ransomware

    March 3, 2023
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) observed in cyberattacks involving Royal Ransomware.
    Read More
    Text4Shell Blog Background

    Customizing AttackIQ Scenarios to Validate Text4Shell Protections

    November 3, 2022
    What is the correct way to validate your controls against a Text4Shell or similar library vulnerability? You need an adjustable, open systems testing platform to test the specific aspects of your implementation to accurately assess if your security controls are correctly configured to stop attacks that leverage it.
    Read More

    Attack Graph Response to US CERT AA22-152A: Karakurt Data Extortion Group 

    June 3, 2022
    AttackIQ has released a new fully featured attack graph emulating the tactics, techniques, and procedures used by the Karakurt Data Extortion Group recently reported in US-CERT Alert AA22-152. 
    Read More

    Testing your defenses against CVE-2022-30190: MSDT “Follina” 0-Day 

    June 2, 2022
    AttackIQ has released a new scenario to test your security controls against exploits used in the Follina 0-day. This new scenario helps security teams validate visibility, patching, security controls, and logging in their environments relative to this pervasive 0-day vulnerability. Elevate your security program performance using AttackIQ.
    Read More

    Attack Graph Response to UNC1151 Continued Targeting of Ukraine

    April 29, 2022
    Uncover new attacks from a threat actor likely operating out of Belarus known as UNC1151 or Ghostwriter.
    Read More

    Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats

    February 24, 2022
    In anticipation of escalating cyberattacks by the Russian government against U.S. and allied interests, AttackIQ has developed a new attack graph to help organizations test and validate their cyberdefenses against known Russian adversarial tactics, techniques, and procedures (TTPs).
    Read More
    Getting ahead of Log4Shell

    Getting Ahead of Log4Shell-enabled Cyberattacks: New Attack Scenarios and Technical Recommendations

    December 20, 2021
    Read More
    Log4Shell

    Validate Your Cyberdefenses against Log4Shell with MITRE ATT&CK®

    December 13, 2021
    This article focuses on helping organizations to assess the effectiveness of their compensating controls, enable a threat-informed defense with breach and attack simulation plus the MITRE ATT&CK framework, and interdict the adversary post-breach to drive down risk.
    Read More

    How to Pitch Your CFO on Automated Security Control Validation

    July 9, 2021
    CFOs are often perceived as gatekeepers to the company’s cash coffers. With different functional leaders vying for project investments, it is true that the role of the CFO is to help prioritize the company’s spend, based on the business growth plan and trajectory.
    Read More

    AttackIQ Now Supports Atomic Red Team

    March 17, 2021
    AttackIQ has added Atomic Red Team to our assessment library, bolstering our testing capabilities to further improve our customers’ security effectiveness.
    Read More

    Before the Election, States Need to Test their Cybersecurity Continuously

    June 4, 2020
    Read More

    Case Study – When Threat Intelligence and Red Team Get Married

    June 25, 2019
    Read More

    Improving the Maturity of your Security Program

    June 11, 2019
    Read More