Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025July 31, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024July 31, 2025
Adversary Emulation Response to CISA Advisory (AA24-241A): Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations ByAyelen Torello August 29, 2024July 31, 2025
Adversary Emulation Emulating the Long-Term Extortionist Nefilim Ransomware ByFrancis Guibernau July 11, 2024July 31, 2025
Adversary Emulation Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 ByFrancis Guibernau July 3, 2024July 31, 2025
Adversary Emulation Emulating the Southeast Asian Adversary OceanLotus ByAttackIQ Team April 16, 2024July 21, 2025
#StopRansomware | Ransomware Attack Graph Response to CISA Advisory (AA23-319A): #StopRansomware: Rhysida Ransomware ByAttackIQ Team November 20, 2023July 21, 2025
Ransomware Emulating the Controversial and Intriguing Rhysida Ransomware ByFrancis Guibernau September 20, 2023July 31, 2025
Adversary Emulation | North Korea Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByAttackIQ Team January 5, 2023July 21, 2025
Breach and Attack Simulation | Cybersecurity Purple Hats 2021: It was an Event “Brimming” with Cybersecurity Goodness ByJordan McMahon June 24, 2021July 31, 2025
Security Controls AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity ByBrett Galloway January 12, 2021July 31, 2025