Iran Iranian Cyber Threat Escalation: Preparing for Asymmetric Response through Adversarial Validation Emulation ByPaul Reid June 23, 2025July 30, 2025
AttackIQ Navigating Container Security with AttackIQ’s Optimization Solutions ByCarlos Koteich May 3, 2024July 31, 2025
Adversary Emulation | Breach and Attack Simulation | US-CERT Alert Response Attack Graph Response to CISA Advisory AA23-129A: Hunting Russian Intelligence “Snake” Malware ByAttackIQ Team May 10, 2023July 21, 2025
Adversary Emulation | Ransomware | Security Control Validation Attack Graph Response to CISA Advisory (AA23-061A): #StopRansomware: Royal Ransomware ByAttackIQ Team March 3, 2023July 21, 2025
Center for Threat-Informed Defense A Year of Impact: AttackIQ’s Applied Research in Threat-Informed Defense ByAttackIQ Team February 27, 2023July 21, 2025
Adversary Emulation | Artificial Intelligence | Breach and Attack Simulation A post about BAS, written in the voice of Langston Hughes, by OpenAI’s ChatGPT ByJonathan Reiber December 12, 2022July 21, 2025
Adversary Emulation | MITRE ATT&CK | US-CERT Alert Response Attack Graph Response to US-CERT Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Ransom Operations ByAttackIQ Team September 16, 2022July 22, 2025
Adversary Emulation | Ransomware | US-CERT Alert Response Attack Graph Response to US-CERT Alert (AA22-249A): #StopRansomware Vice Society ByAttackIQ Team September 8, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | MITRE ATT&CK Leveraging the MITRE ATT&CK framework to build a threat-informed defense ByAttackIQ Team July 29, 2022
Adversary Emulation | Breach and Attack Simulation | Command and Control | Security Controls OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns ByAttackIQ Team July 11, 2022
Adversary Emulation | MITRE ATT&CK | US-CERT Alert Response Response to US-CERT Alert (AA22-174A): Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems ByAttackIQ Team June 24, 2022July 22, 2025
Adversary Emulation | MITRE ATT&CK | Ransomware Attack Graph Emulating the Conti Ransomware Team’s Behaviors ByAttackIQ Adversary Research Team June 15, 2022July 22, 2025
MITRE ATT&CK | Ransomware | Threat-Informed Defense | TTPs Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Malware | Russia Attack Graph Response to US-CERT AA22-083A: Historical Russia-based Actors Targeting the Energy Sector ByKen Towne April 1, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Center for Threat-Informed Defense | Cyberattack | Machine Learning | Threat-Informed Defense | TTPs Testing with Realism: Attack Flows and AttackIQ Attack Graphs ByJonathan Reiber March 11, 2022July 31, 2025
Adversary Emulation | Russia | Security Control Validation | US-CERT Alert Response Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats ByAdam Moore February 24, 2022July 22, 2025
Cybersecurity The Center for Threat-Informed Defense: Impacting the Public Good ByCarl Wright February 9, 2022July 31, 2025
Vulnerability Research Compliance and Cyber Security Risk Reduction Don’t have to be Enemies ByTim Morgan February 8, 2022
Center for Threat-Informed Defense | Cybersecurity Prioritize and streamline vulnerability management through a threat-informed defense, with new research from the Center for Threat-Informed Defense and the MITRE ATT&CK framework as a foundation. ByJonathan Reiber October 29, 2021July 31, 2025
Adversary Emulation | Cybersecurity “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works. ByJonathan Reiber October 4, 2021July 31, 2025
Center for Threat-Informed Defense | Cloud Security Cloud platforms can stop adversaries. Here’s how. ByJonathan Reiber September 22, 2021July 31, 2025
Cybersecurity | Ransomware Is Your Healthcare Organization Following These Four Ransomware Best Practices? ByTracy Cohen August 24, 2021July 31, 2025
Cybersecurity How purple team operations helped defend the Pentagon — and can help your security team today. ByJonathan Reiber July 16, 2021July 31, 2025