Adversary Emulation Malware Emulation Attack Graph for SysJoker’s Linux Variant AttackIQ’s Adversary Research Team has released a new Malware Emulation Attack Graph that emulates the Linux behaviors of the multi-platform backdoor known as SysJoker. August 2, 2022 Read More
Breach and Attack Simulation Innovating During COVID-19 to Improve Security Effectiveness Crises such as the COVID-19 pandemic bring out the worst—and the best— humankind. In cybersecurity,… December 1, 2020 Read More
Ransomware A historic plan, built for the public. In a historic first, industry leaders have collaborated to produce an attack emulation plan built… September 15, 2020 Read More
Adversary Emulation “Think Bad, Do Good” Ep 2: How to Achieve Cybersecurity Effectiveness “How to Achieve Cybersecurity Effectiveness,” a conversation with the Chertoff Group’s Adam Isles and Kurt Alaybeyoglu, hosted by Jonathan… June 15, 2020 Read More
Ransomware Securing Your Supply Chain It turns out that in the last three years there have been more than five… May 5, 2019 Read More
Cybercrime Open Source Vulnerability Management Some of you may be wondering, how prevalent is the use of open-source software in… April 28, 2019 Read More
Cyberattack MITRE ATT&CK Evaluations Of Cyber Security Products The threat group commonly known as APT3 are primarily interested in stealing documents and other… March 31, 2019 Read More
Cybercrime How the Experian Data Breach Case Might Change the Protection of Breach Investigation Reports For many of us that attend DFIR meetups and actively track breaches and all that… May 27, 2017 Read More
Ransomware Anatomy of a Ransomware Attack By now, we have realized how lucrative the ransomware business has become for criminals. This… July 7, 2016 Read More