Security Controls

    OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns

    July 11, 2022
    AttackIQ has released two new attack graphs that emulate different aspects of OilRig’s operations against multiple sectors around the globe. With these attack graphs, you can test and validate your defenses to improve cybersecurity readiness.
    Read More

    Integrations – Vectra

    April 18, 2022
    AttackIQ has released a new integration for use with network based scenarios. This blog describes use cases, scenarios one can utilize and what indicators we look for when determining a match.
    Read More
    Getting ahead of Log4Shell

    Getting Ahead of Log4Shell-enabled Cyberattacks: New Attack Scenarios and Technical Recommendations

    December 20, 2021
    Read More

    AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help.

    April 26, 2021
    The goal is greater visibility and effectiveness.
    Read More

    The U.S. Government Needs to Overhaul Cybersecurity. Here’s How.

    April 9, 2021
    In advance of the new Biden administration cybersecurity executive order, it’s time for the federal government to get proactive about cybersecurity. Deploying a validated zero trust architecture for the U.S. government’s most critical high-value assets is an aggressive but achievable goal.
    Read More

    Data Obfuscation: An Image Is Worth a Thousand Lines of Malware

    February 16, 2021
    Adversaries love to hide malware in images, a tactic called data obfuscation. To help you solve this problem, at AttackIQ we have built scenarios to test your defensive capabilities’ ability to detect and prevent image-based malware. Read on to learn how it works – and how you can obfuscate data on your own to test your defenses.
    Read More

    GAO Finds Gaps in DoD Cyberdefenses, Highlights Importance of Breach and Attack Simulation Tools

    February 8, 2021
    AttackIQ’s Security Optimization Platform gives an agency a proactive—rather than a reactive—security posture. It enables continuous validation of security controls to definitively establish the effectiveness of key initiatives, to include zero-trust controls that prevent adversaries from moving laterally across a network, as in the case of SolarWinds.
    Read More

    AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity

    January 12, 2021
    Read More

    Five ways to lock down security control validation

    November 12, 2020
    Simple and important steps to make your cybersecurity program more efficient and effective.
    Read More

    AttackIQ Named one of the 2020 Best Small & Medium Workplaces™ by Great Place to Work® and Fortune

    October 16, 2020
    Read More

    Countering ransomware with AttackIQ’s Security Optimization Platform

    August 19, 2020
    Ransomware is on the rise, particularly against city government and hospitals. In advance of the 2020 U.S. presidential election, how does the AttackIQ Security Optimization Platform help businesses to defend themselves?
    Read More

    “Think Bad. Do Good” Podcast Episode 3: Best Practices in Threat-Informed Defense

    July 9, 2020
    Read More

    AttackIQ Includes MITRE ATT&CK’s New Sub-Techniques for Customers

    July 7, 2020
    Read More

    COVID-19 Is Forcing Hard Cybersecurity Choices

    June 15, 2020
    Read More

    2020 Verizon Data Breach Investigations Report: Analysis, Findings, and AttackIQ Commentary

    May 20, 2020
    Read More

    Threat-Informed Defense and Purple Teaming: Lessons from U.S. Cyber Command

    May 15, 2020
    Read More

    Emulating Attacker Activities and The Pyramid of Pain

    June 26, 2019
    Some of you might be familiar with “The Pyramid of Pain”, first introduced in 2013 by security professional David J Bianco when he was focused on incident response and threat hunting for the purpose of improving the applicability of attack indicators.
    Read More

    NASA JPL Breaches – A Reminder of Basic Cyber Security Hygiene

    June 24, 2019
    Read More

    Attack Paths and Kill Chains – AttackIQ Contributions to the Verizon 2019 DBIR Report

    June 17, 2019
    Read More

    Why Is Container Security Important

    May 12, 2019
    Read More

    “Locker Goga” The 2019 Addition to the Ransomware Family

    April 14, 2019
    Read More

    The Evolution Of Malware Fileless Exploits

    March 24, 2019
    Read More

    Rising Above the Noise at RSA

    March 13, 2019
    Read More

    MITRE ATT&CK Module

    June 28, 2018
    Read More