Threat Research Iranian Cyber Threat Escalation: Preparing for Asymmetric Response through Adversarial Validation Emulation ByPaul Reid June 23, 2025January 14, 2026
Product & Platform Navigating Container Security with AttackIQ’s Optimization Solutions ByCarlos Koteich May 3, 2024January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory AA23-129A: Hunting Russian Intelligence “Snake” Malware ByKen Towne May 10, 2023January 15, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-061A): #StopRansomware: Royal Ransomware ByFrancis Guibernau March 3, 2023January 15, 2026
Industry & Community A Year of Impact: AttackIQ’s Applied Research in Threat-Informed Defense ByNick Desler February 27, 2023January 15, 2026
Insights & Perspectives A post about BAS, written in the voice of Langston Hughes, by OpenAI’s ChatGPT ByJonathan Reiber December 12, 2022January 14, 2026
Threat Advisories Attack Graph Response to US-CERT Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Ransom Operations ByFrancis Guibernau September 16, 2022January 15, 2026
Threat Advisories Attack Graph Response to US-CERT Alert (AA22-249A): #StopRansomware Vice Society ByFrancis Guibernau September 8, 2022January 15, 2026
Threat Research Leveraging the MITRE ATT&CK framework to build a threat-informed defense ByAttackIQ Team July 29, 2022January 14, 2026
Threat Research OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns ByAttackIQ Team July 11, 2022January 15, 2026
Threat Advisories Response to US-CERT Alert (AA22-174A): Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems ByJackson Wells June 24, 2022January 15, 2026
Threat Research Attack Graph Emulating the Conti Ransomware Team’s Behaviors ByAttackIQ Adversary Research Team June 15, 2022January 14, 2026
Threat Advisories Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022January 14, 2026
Threat Advisories Attack Graph Response to US-CERT AA22-083A: Historical Russia-based Actors Targeting the Energy Sector ByKen Towne April 1, 2022January 15, 2026
Threat Research Testing with Realism: Attack Flows and AttackIQ Attack Graphs ByJonathan Reiber March 11, 2022January 14, 2026
Threat Advisories Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats ByAdam Moore February 24, 2022January 14, 2026
Insights & Perspectives The Center for Threat-Informed Defense: Impacting the Public Good ByCarl Wright February 9, 2022January 14, 2026
Threat Research Compliance and Cyber Security Risk Reduction Don’t have to be Enemies ByTim Morgan February 8, 2022January 14, 2026
Insights & Perspectives The trick to handling ransomware: prepare ByJonathan Reiber January 19, 2022January 14, 2026
Industry & Community Prioritize and streamline vulnerability management through a threat-informed defense, with new research from the Center for Threat-Informed Defense and the MITRE ATT&CK framework as a foundation. ByJonathan Reiber October 29, 2021January 14, 2026
Insights & Perspectives “Zero Trust But Validate.” It’s not enough to deploy a zero trust architecture. You need to continuously validate that it works. ByJonathan Reiber October 4, 2021January 14, 2026
Industry & Community Cloud platforms can stop adversaries. Here’s how. ByJonathan Reiber September 22, 2021January 14, 2026
Insights & Perspectives Is Your Healthcare Organization Following These Four Ransomware Best Practices? ByTracy Cohen August 24, 2021January 14, 2026
Insights & Perspectives How purple team operations helped defend the Pentagon — and can help your security team today. ByJonathan Reiber July 16, 2021January 14, 2026