Adversary Emulation Emulating the Sophisticated Russian Adversary Seashell Blizzard ByAyelen Torello April 2, 2025July 21, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025July 31, 2025
Adversary Emulation Updated Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group ByAyelen Torello January 16, 2025July 31, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024July 31, 2025
Adversary Emulation | Iran Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024July 31, 2025
Adversary Emulation Response to CISA Advisory (AA24-207A): North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs ByFrancis Guibernau July 26, 2024July 21, 2025
Adversary Emulation Emulating the Sabotage-Focused Russian Adversary Sandworm-Part 1 ByFrancis Guibernau March 6, 2024July 31, 2025
Adversary Emulation | China Response to CISA Advisory (AA24-038A): PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure ByAttackIQ Team February 9, 2024July 21, 2025
Adversary Emulation | China Response to CISA Advisory (AA23-144A): China State-Sponsored Actor Volt Typhoon Living off the Land to Evade Detection ByAttackIQ Team May 25, 2023July 21, 2025
Adversary Emulation Emulating the Cybercriminal Initial Access Broker TA551 ByAttackIQ Team March 3, 2023July 21, 2025
Adversary Emulation | North Korea Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByAttackIQ Team January 5, 2023July 21, 2025
Adversary Emulation | Breach and Attack Simulation | Russia Emulating the Sophisticated Russian Adversary APT28 ByAttackIQ Team September 21, 2022July 22, 2025