Product & Platform 25 New Adversary Emulation Packages Covering Ransomware and Advisory-Driven Threats ByPaul Reid January 21, 2026January 21, 2026
Threat Research Emulating the Elegant BlackSuit Ransomware ByFrancis Guibernau January 20, 2026January 20, 2026
Threat Research Emulating the Espionage-Oriented Group SideWinder ByAyelen Torello November 13, 2025January 15, 2026
Threat Research The Evolution of RomCom: From Backdoor to Cyberwar ByFrancis Guibernau September 23, 2025January 15, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group ByFrancis Guibernau May 18, 2023January 15, 2026
Threat Advisories Attack Graph Response to CISA Advisory AA23-129A: Hunting Russian Intelligence “Snake” Malware ByKen Towne May 10, 2023January 15, 2026
Industry & Community A Year of Impact: AttackIQ’s Applied Research in Threat-Informed Defense ByNick Desler February 27, 2023January 15, 2026
Industry & Community Democratizing the Practice of Adversary Emulation ByJonathan Reiber February 14, 2023January 14, 2026
Insights & Perspectives Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing. ByJonathan Reiber December 13, 2022January 14, 2026
Threat Advisories Attack Graph Response to US-CERT Alert (AA22-223A): Testing Security Controls against Zeppelin Ransomware ByKen Towne August 11, 2022January 14, 2026
Threat Research Malware Emulation Attack Graph for SysJoker’s Linux Variant ByJackson Wells August 2, 2022January 15, 2026
Threat Research OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns ByAttackIQ Team July 11, 2022January 15, 2026
Threat Advisories Response to US-CERT Alert (AA22-174A): Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems ByJackson Wells June 24, 2022January 15, 2026
Threat Research Attack Graph Emulating the Conti Ransomware Team’s Behaviors ByAttackIQ Adversary Research Team June 15, 2022January 14, 2026
Insights & Perspectives “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works. ByJonathan Reiber October 4, 2021January 14, 2026
Insights & Perspectives Is Your Healthcare Organization Following These Four Ransomware Best Practices? ByTracy Cohen August 24, 2021January 14, 2026
Threat Research The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided ByAndrew Costis July 13, 2021January 14, 2026
Threat Research Put MITRE ATT&CK® to work through Workbench ByAndrew Costis June 22, 2021January 14, 2026
Insights & Perspectives AttackIQ and MITRE Engenuity’s Center for Threat Informed Defense are “sighting” ATT&CK techniques in the wild. Come and help. ByJonathan Reiber April 26, 2021January 14, 2026
Insights & Perspectives Breach and Attack Simulation, Unlike Shoulder Pads, Mullets, and Parachute Pants, is a Trend That is Here to Stay ByJulie O'Brien April 6, 2021January 14, 2026
Industry & Community In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass ByJonathan Reiber February 23, 2021January 14, 2026
Insights & Perspectives AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity ByBrett Galloway January 12, 2021January 14, 2026
Insights & Perspectives Grandpa’s New Shoes—or How Compliance Learned to Love Adversary Emulation ByMark Bagley December 15, 2020January 14, 2026
Insights & Perspectives A historic plan, built for the public. ByCarl Wright September 15, 2020January 14, 2026