Adversary Emulation Emulating the Destructive Sandworm Adversary ByAyelen Torello November 14, 2025November 14, 2025
Adversary Emulation Emulating the Prominent Global Group Ransomware ByAyelen Torello October 16, 2025October 16, 2025
Adversary Emulation Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies ByAyelen Torello May 21, 2025July 29, 2025
Adversary Emulation Emulating the Sophisticated Russian Adversary Seashell Blizzard ByAyelen Torello April 2, 2025July 21, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025July 31, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024July 31, 2025
Adversary Emulation Response to CISA Advisory (AA24-249A): Russian Military Cyber Actors Target US and Global Critical Infrastructure ByFrancis Guibernau September 10, 2024July 31, 2025
Adversary Emulation Emulating Sandworm’s Prestige Ransomware ByFrancis Guibernau August 2, 2024July 31, 2025
Adversary Emulation Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 ByFrancis Guibernau July 3, 2024July 31, 2025
Adversary Emulation Emulating the Sabotage-Focused Russian Adversary Sandworm-Part 1 ByFrancis Guibernau March 6, 2024July 31, 2025
Adversary Emulation Response to CISA Advisory (AA24-057A): SVR Cyber Actors Adapt Tactics for Initial Cloud Access ByAttackIQ Team February 27, 2024July 21, 2025
Adversary Emulation Response to CISA Advisory (AA23-347A): Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally ByFrancis Guibernau December 21, 2023July 31, 2025
AttackIQ Flex | Breach and Attack Simulation | Cybersecurity | Cybersecurity Education | Leadership | Security Control Validation How Does Your Security Stack Up Against Russian Spies? ByCarl Wright August 23, 2023July 31, 2025
Adversary Emulation | Breach and Attack Simulation | US-CERT Alert Response Attack Graph Response to CISA Advisory AA23-129A: Hunting Russian Intelligence “Snake” Malware ByAttackIQ Team May 10, 2023July 21, 2025
Adversary Emulation | Russia Emulating Recent Activity from the Russian Adversary Nobelium / APT29 ByAttackIQ Team May 4, 2023July 21, 2025
Adversary Emulation | Artificial Intelligence | Breach and Attack Simulation | Russia Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing. ByJonathan Reiber December 13, 2022July 21, 2025
MITRE ATT&CK | Ransomware | Threat-Informed Defense | TTPs Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group ByAdam Moore June 2, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Malware | Russia Attack Graph Response to US-CERT AA22-083A: Historical Russia-based Actors Targeting the Energy Sector ByKen Towne April 1, 2022July 22, 2025
Adversary Emulation | Breach and Attack Simulation | Russia Testing Network Security Controls against Russian Malware ByKen Towne March 29, 2022July 31, 2025
Adversary Emulation | Cyberattack | Cybersecurity | Russia | TTPs Attack Graph Response to US CERT AA22-074A: Russia-based actors disabling multi-factor authentication (MFA) ByKen Towne March 18, 2022July 22, 2025
Adversary Emulation | Russia | Security Control Validation | US-CERT Alert Response Attack Graph Response to US-CERT AA22-011A & AA22-047A: Preparing for Russian State-Sponsored Cyberthreats ByAdam Moore February 24, 2022July 22, 2025
Command and Control | Security Controls Data Obfuscation: An Image Is Worth a Thousand Lines of Malware ByOriol Castejón February 16, 2021July 31, 2025
Cyberattack This election year, the health of the Union depends in part on how we safeguard our information ByJonathan Reiber September 23, 2020July 31, 2025