Threat Advisories Response to CISA Advisory (AA25-239A): Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System ByAyelen Torello September 4, 2025January 15, 2026
Threat Research Emulating the Unyielding Scattered Spider ByAyelen Torello May 29, 2025January 14, 2026
Threat Advisories Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies ByAyelen Torello May 21, 2025January 14, 2026
Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025January 14, 2026
Threat Research Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024January 14, 2026
Threat Advisories Emulating the Sabotage-Focused Russian Adversary Sandworm– Part 2 ByFrancis Guibernau July 3, 2024January 14, 2026
Threat Advisories Emulating the Notorious Chinese State-Sponsored Winnti Group ByAyelen Torello June 20, 2024January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-319A): #StopRansomware: Rhysida Ransomware ByFrancis Guibernau November 20, 2023January 15, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-263A): #StopRansomware: Snatch Ransomware ByFrancis Guibernau October 4, 2023January 15, 2026
Threat Research Emulating the Controversial and Intriguing Rhysida Ransomware ByFrancis Guibernau September 20, 2023January 14, 2026
Threat Research Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByFrancis Guibernau January 5, 2023January 15, 2026
Insights & Perspectives How to Pitch Your CFO on Automated Security Control Validation ByDanielle Murcray July 9, 2021January 14, 2026
Insights & Perspectives The U.S. Government Needs to Overhaul Cybersecurity. Here’s How. ByJonathan Reiber April 9, 2021January 14, 2026
Insights & Perspectives Breach and Attack Simulation, Unlike Shoulder Pads, Mullets, and Parachute Pants, is a Trend That is Here to Stay ByJulie O'Brien April 6, 2021January 14, 2026
Insights & Perspectives GAO Finds Gaps in DoD Cyberdefenses, Highlights Importance of Breach and Attack Simulation Tools ByStacey Meyer February 8, 2021January 14, 2026
Insights & Perspectives AttackIQ’s Automated Threat-Informed Defense Approach is Transforming Cybersecurity ByBrett Galloway January 12, 2021January 14, 2026
Insights & Perspectives Innovating During COVID-19 to Improve Security Effectiveness ByJulie O'Brien December 1, 2020January 14, 2026
Insights & Perspectives Five ways to lock down security control validation ByChris Kennedy November 12, 2020January 14, 2026
Insights & Perspectives AttackIQ Named one of the 2020 Best Small & Medium Workplaces™ by Great Place to Work® and Fortune ByJulie O'Brien October 16, 2020January 14, 2026
Insights & Perspectives AttackIQ’s business is not security testing. ByBrett Galloway August 3, 2020January 14, 2026
Insights & Perspectives “Think Bad, Do Good” Ep 2: How to Achieve Cybersecurity Effectiveness ByJonathan Reiber June 15, 2020January 14, 2026
Insights & Perspectives COVID-19 Is Forcing Hard Cybersecurity Choices ByJonathan Reiber June 15, 2020January 14, 2026
Insights & Perspectives Why I Joined AttackIQ: Compelling Mission, Amazing Team ByJulie O'Brien May 18, 2020January 14, 2026