Threat Advisories Attack Graph Response to CISA Advisory AA23-165A: Understanding Ransomware Threat Actors: LockBit ByFrancis Guibernau June 14, 2023January 15, 2026
Threat Advisories Attack Graph Response to US-CERT Alert (AA22-249A): #StopRansomware Vice Society ByFrancis Guibernau September 8, 2022January 15, 2026
Threat Research Attack Graph Emulating the Conti Ransomware Team’s Behaviors ByAttackIQ Adversary Research Team June 15, 2022January 14, 2026
Threat Advisories Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022January 14, 2026
Insights & Perspectives The trick to handling ransomware: prepare ByJonathan Reiber January 19, 2022January 14, 2026
Insights & Perspectives Is Your Healthcare Organization Following These Four Ransomware Best Practices? ByTracy Cohen August 24, 2021January 14, 2026
Threat Research The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided ByAndrew Costis July 13, 2021January 14, 2026
Insights & Perspectives Purple Hats 2021: It was an Event “Brimming” with Cybersecurity Goodness ByJordan McMahon June 24, 2021January 14, 2026
Threat Research Put MITRE ATT&CK® to work through Workbench ByAndrew Costis June 22, 2021January 14, 2026
Insights & Perspectives Risky Business #624 — AttackIQ’s Mark Bagley and Jonathan Reiber talk with Patrick Gray of Risky Biz about how to solve the ransomware problem ByAttackIQ, Inc. May 19, 2021January 14, 2026
Insights & Perspectives Countering ransomware with AttackIQ’s Security Optimization Platform ByMark Bagley August 19, 2020January 14, 2026
Insights & Perspectives 2020 Verizon Data Breach Investigations Report: Analysis, Findings, and AttackIQ Commentary ByStephan Chenette May 20, 2020January 14, 2026
Threat Research Predicting Attack Behavior – Ransomware Patterns Strategic Leaders Need to be Aware of ByStephan Chenette June 28, 2019January 14, 2026
Insights & Perspectives “Locker Goga” The 2019 Addition to the Ransomware Family ByVinod Peris April 14, 2019January 14, 2026
Insights & Perspectives The Evolution Of Malware Fileless Exploits ByVinod Peris March 24, 2019January 14, 2026