Threat-Informed Defense

    Mission. Impact. Opportunity.

    October 14, 2025
    After 23 years at MITRE leading the charge on threat-informed defense, Jon Baker joined AttackIQ to turn innovation into real-world security impact.
    Read More
    Blog Background

    How to Test Your Defenses Against Personalized Top 10 MITRE ATT&CK Techniques

    August 4, 2022
    The Center for Threat-Informed Defense recently published a methodology and calculator so that you can identify the top MITRE ATT&CK techniques that impact your sector.
    Read More
    Blog Image for US Cert Alert AA22-152A

    Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group 

    June 2, 2022
    AttackIQ has released a new scenario and assessment in response to US-CERT Alert AA22-152A, Karakurt Data Extortion Group 
    Read More

    Attack Graph Response to UNC1151 Continued Targeting of Ukraine

    April 29, 2022
    Uncover new attacks from a threat actor likely operating out of Belarus known as UNC1151 or Ghostwriter.
    Read More

    Testing with Realism: Attack Flows and AttackIQ Attack Graphs  

    March 11, 2022
    AttackIQ and the Center for Threat-Informed Defense are furthering the art of adversary emulation with the Center’s new Attack Flow project. Building on our deep research partnership with the Center, AttackIQ’s Attack Graphs emulate the adversary with specificity and realism to test advanced cyberdefense technologies against multi-stage attacks. Read on for more.
    Read More

    Meet AttackIQ Vanguard: Helping security teams identify control gaps before the adversary does.

    September 30, 2021
    As organizations react to constantly changing and challenging situations today, they need to be confident they can still meet their business objectives while controlling risk.
    Read More

    The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided

    July 13, 2021
    On July 2, 2021, the REvil ransomware group successfully exploited a zero-day vulnerability in the on-premise Kaseya VSA server, enabling a wide-scale supply chain cyber attack. Let’s dig in and see how the attack happened, how attack emulation could have helped, and what you can do to implement a threat-informed defense strategy to prepare yourself for similar threat actor behavior.
    Read More

    Episode 3: Best Practices in Threat-Informed Defense

    August 1, 2020
    Read More

    Episode 1: APT29 and Threat Informed Defense (Pilot)

    July 28, 2020
    Read More