Iran Iranian Cyber Threat Escalation: Preparing for Asymmetric Response through Adversarial Validation Emulation ByPaul Reid June 23, 2025July 30, 2025
Adversary Emulation | Iran Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024July 31, 2025
Adversary Emulation Response to CISA Advisory (AA24-241A): Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations ByAyelen Torello August 29, 2024July 31, 2025
Adversary Emulation | MITRE ATT&CK | US-CERT Alert Response Attack Graph Response to US-CERT Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Ransom Operations ByAttackIQ Team September 16, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Command and Control | Security Controls OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns ByAttackIQ Team July 11, 2022
Security Controls AttackIQ Includes MITRE ATT&CK’s New Sub-Techniques for Customers ByJonathan Reiber July 7, 2020July 31, 2025
TTPs The Hornet’s Nest was just Kicked… What’s Your Move? ByChris Kennedy January 8, 2020July 31, 2025
Security Controls NASA JPL Breaches – A Reminder of Basic Cyber Security Hygiene ByStephan Chenette June 24, 2019July 31, 2025