CISA Alert Response to CISA Alert: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities ByFrancis Guibernau July 30, 2025August 12, 2025
Adversary Emulation Emulating Sandworm’s Prestige Ransomware ByFrancis Guibernau August 2, 2024July 31, 2025
Security Controls The U.S. Government Needs to Overhaul Cybersecurity. Here’s How. ByJonathan Reiber April 9, 2021July 31, 2025
Breach and Attack Simulation Breach and Attack Simulation, Unlike Shoulder Pads, Mullets, and Parachute Pants, is a Trend That is Here to Stay ByJulie O'Brien April 6, 2021July 31, 2025
Breach and Attack Simulation | TTPs Innovating During COVID-19 to Improve Security Effectiveness ByJulie O'Brien December 1, 2020July 31, 2025
Security Controls COVID-19 Is Forcing Hard Cybersecurity Choices ByJonathan Reiber June 15, 2020July 31, 2025
Ransomware | Security Controls “Locker Goga” The 2019 Addition to the Ransomware Family ByVinod Peris April 14, 2019August 1, 2025
Ransomware | Security Controls The Evolution Of Malware Fileless Exploits ByVinod Peris March 24, 2019August 1, 2025
Breach and Attack Simulation | Security Controls WannaCry Ransomware: Lessons Learned ByAttackIQ, Inc. May 15, 2017August 1, 2025
TTPs Next Generation Security Teams Are Watching The Game Plays, Are You? ByStephan Chenette June 27, 2016August 1, 2025