Adversary Emulation Emulating the Espionage-Oriented Group SideWinder ByAyelen Torello November 13, 2025November 13, 2025
Ransomware The Evolution of RomCom: From Backdoor to Cyberwar ByFrancis Guibernau September 23, 2025September 23, 2025
Adversary Emulation Attack Graph Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group ByAttackIQ Team May 18, 2023July 21, 2025
Adversary Emulation | Breach and Attack Simulation | US-CERT Alert Response Attack Graph Response to CISA Advisory AA23-129A: Hunting Russian Intelligence “Snake” Malware ByAttackIQ Team May 10, 2023July 21, 2025
Center for Threat-Informed Defense A Year of Impact: AttackIQ’s Applied Research in Threat-Informed Defense ByAttackIQ Team February 27, 2023July 21, 2025
Adversary Emulation | Breach and Attack Simulation | Center for Threat-Informed Defense Democratizing the Practice of Adversary Emulation ByJonathan Reiber February 14, 2023July 21, 2025
Adversary Emulation | Artificial Intelligence | Breach and Attack Simulation | Russia Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing. ByJonathan Reiber December 13, 2022July 21, 2025
Adversary Emulation | Breach and Attack Simulation | Ransomware | US-CERT Alert Response Attack Graph Response to US-CERT Alert (AA22-223A): Testing Security Controls against Zeppelin Ransomware ByKen Towne August 11, 2022July 22, 2025
Adversary Emulation | Cyberattack | Cybercrime | Malware Malware Emulation Attack Graph for SysJoker’s Linux Variant ByAttackIQ Team August 2, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Command and Control | Security Controls OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns ByAttackIQ Team July 11, 2022
Adversary Emulation | MITRE ATT&CK | US-CERT Alert Response Response to US-CERT Alert (AA22-174A): Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems ByAttackIQ Team June 24, 2022July 22, 2025
Adversary Emulation | MITRE ATT&CK | Ransomware Attack Graph Emulating the Conti Ransomware Team’s Behaviors ByAttackIQ Adversary Research Team June 15, 2022July 22, 2025
Adversary Emulation | Cybersecurity “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works. ByJonathan Reiber October 4, 2021July 31, 2025
Cybersecurity | Ransomware Is Your Healthcare Organization Following These Four Ransomware Best Practices? ByTracy Cohen August 24, 2021July 31, 2025
Ransomware | Threat-Informed Defense The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided ByAndrew Costis July 13, 2021July 31, 2025
Adversary Emulation | Ransomware | TTPs Put MITRE ATT&CK® to work through Workbench ByAndrew Costis June 22, 2021July 31, 2025
Breach and Attack Simulation | Security Controls AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help. ByJonathan Reiber April 26, 2021July 31, 2025
Breach and Attack Simulation Breach and Attack Simulation, Unlike Shoulder Pads, Mullets, and Parachute Pants, is a Trend That is Here to Stay ByJulie O'Brien April 6, 2021July 31, 2025
Center for Threat-Informed Defense In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass ByJonathan Reiber February 23, 2021July 31, 2025
Security Controls AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity ByBrett Galloway January 12, 2021July 31, 2025
Adversary Emulation Grandpa’s New Shoes—or How Compliance Learned to Love Adversary Emulation ByMark Bagley December 15, 2020July 31, 2025
Adversary Emulation “Think Bad, Do Good” Ep 2: How to Achieve Cybersecurity Effectiveness ByJonathan Reiber June 15, 2020July 31, 2025
Adversary Emulation | Security Controls Threat-Informed Defense and Purple Teaming: Lessons from U.S. Cyber Command ByJonathan Reiber May 15, 2020July 31, 2025