Emulating the Sophisticated Chinese Adversary Salt Typhoon

AttackIQ has released a new assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the sabotage-motivated Chinese adversary Salt Typhoon. The post Emulating the Sophisticated Chinese Adversary ...

[CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware

AttackIQ has released a new attack graph in response to the CISA Advisory (AA25-050A) published on February 19, 2025, which disseminates known Ghost Ransomware Tactics, Techniques, and Procedures (TTPs) and Indicators of ...
ransomware, attacks, resilience, cyber, ransomware, report

LockBit, RansomHub Lead Ransomware Attacks in July

Global ransomware attacks surged by 19% in July compared to June, climbing from 331 to 395 incidents, according to the latest data from NCC Group ...
Security Boulevard

Emulating the Notorious Chinese State-Sponsored Winnti Group

AttackIQ has released three new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the stealthy and notorious Winnti Group during its activities in ...

Emulating the Open-Source Remote Access Trojan (RAT) AsyncRAT

AttackIQ has released two new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the open-source Remote Access Trojan AsyncRAT during its activities in ...

Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta

AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA24-131A) which disseminates known Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated to Black ...

Response to CISA Advisory (AA24-016A): Known Indicators of Compromise Associated with Androxgh0st Malware

AttackIQ has released a new assessment template in response to the recently published CISA Advisory (AA24-016A) which disseminates known Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) associated with threat ...
Halloween cybercriminals

Spookiest Hacks, Cybercriminals and Tactics Lurking in 2023

A Bitdefender study found nearly half of Halloween-themed spam is fraudulent, with 69% of the spam hitting U.S. inboxes ...
Security Boulevard
HR, cyberthreat, landscape, insider threats, HP Wolf TeamViewer, insider, application, insider risk, case, threat Palo Alto network IP theft

HP Report Details Tactics Used to Evade Detection Tools

HP Wolf Security report showed how tactics and techniques cybercriminals use to evade detection are evolving ...
Security Boulevard
ransom networking ransomware

Understanding the Progression of a Ransomware Attack

Everyone should be familiar with ransomware and its impact on businesses by now. But while you may understand the very basics of ransomware, you can’t really protect your organization until you are ...
Security Boulevard