Threat Research Emulating the Sophisticated Chinese Adversary Salt Typhoon ByFrancis Guibernau March 19, 2025January 14, 2026
Threat Advisories [CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware ByFrancis Guibernau February 20, 2025January 14, 2026
Threat Advisories Emulating the Notorious Chinese State-Sponsored Winnti Group ByAyelen Torello June 20, 2024January 14, 2026
Threat Advisories Emulating the Open-Source Remote Access Trojan (RAT) AsyncRAT ByAyelen Torello May 24, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta ByFrancis Guibernau May 17, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA24-016A): Known Indicators of Compromise Associated with Androxgh0st Malware ByFrancis Guibernau January 19, 2024January 14, 2026
Threat Advisories Response to CISA Advisory (AA23-353A): #StopRansomware: ALPHV BlackCat ByFrancis Guibernau December 29, 2023January 14, 2026
Threat Advisories Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware ByFrancis Guibernau December 23, 2023January 14, 2026
Threat Advisories Response to CISA Advisory (AA23-349A): Enhancing Cyber Resilience: Insights from the CISA Healthcare and Public Health Sector Risk and Vulnerability Assessment ByAndrew Costis December 22, 2023January 14, 2026
Threat Advisories Response to CISA Advisory (AA23-320A): Scattered Spider ByAttackIQ Team November 21, 2023January 14, 2026
Threat Advisories Attack Graph Response to CISA Advisory (AA23-284A): #StopRansomware: AvosLocker Ransomware ByFrancis Guibernau November 1, 2023January 14, 2026
Threat Research Put MITRE ATT&CK® to work through Workbench ByAndrew Costis June 22, 2021January 14, 2026
Insights & Perspectives 10 Ways to Apply the MITRE ATT&CK Framework in Your Cybersecurity Strategy ByJordan McMahon June 22, 2021January 14, 2026
Insights & Perspectives A Next Step “On The Road” (to Security Optimization) ByMark Bagley March 23, 2021January 14, 2026
Insights & Perspectives Lions and Tigers and a December Full of Adversary Activity – Oh My! ByMark Bagley December 23, 2020January 14, 2026
Insights & Perspectives Innovating During COVID-19 to Improve Security Effectiveness ByJulie O'Brien December 1, 2020January 14, 2026
Insights & Perspectives Countering ransomware with AttackIQ’s Security Optimization Platform ByMark Bagley August 19, 2020January 14, 2026
Insights & Perspectives What Security Teams Can Learn from the Attacks on Twitter and COVID-19 Researchers ByChris Kennedy July 23, 2020January 14, 2026
Threat Research Purple Teaming Chronicles II: Red-Team Augmentation BySergi Martinez June 30, 2020January 14, 2026
Threat Research Australian Cyber Security Centre (ACSC) Attacker Trends: Useful Information from the Government ByChris Kennedy June 16, 2020January 14, 2026
Insights & Perspectives Purple Teaming Chronicles Part 1 BySergi Martinez May 22, 2020January 14, 2026
Threat Research The Hornet’s Nest was just Kicked… What’s Your Move? ByChris Kennedy January 8, 2020January 14, 2026