TTPs
Emulating the Sophisticated Chinese Adversary Salt Typhoon
AttackIQ has released a new assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the sabotage-motivated Chinese adversary Salt Typhoon. The post Emulating the Sophisticated Chinese Adversary ...
[CISA AA25-050A] #StopRansomware: Ghost (Cring) Ransomware
AttackIQ has released a new attack graph in response to the CISA Advisory (AA25-050A) published on February 19, 2025, which disseminates known Ghost Ransomware Tactics, Techniques, and Procedures (TTPs) and Indicators of ...

LockBit, RansomHub Lead Ransomware Attacks in July
Global ransomware attacks surged by 19% in July compared to June, climbing from 331 to 395 incidents, according to the latest data from NCC Group ...
Emulating the Notorious Chinese State-Sponsored Winnti Group
AttackIQ has released three new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the stealthy and notorious Winnti Group during its activities in ...
Emulating the Open-Source Remote Access Trojan (RAT) AsyncRAT
AttackIQ has released two new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the open-source Remote Access Trojan AsyncRAT during its activities in ...
Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta
AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA24-131A) which disseminates known Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated to Black ...
Response to CISA Advisory (AA24-016A): Known Indicators of Compromise Associated with Androxgh0st Malware
AttackIQ has released a new assessment template in response to the recently published CISA Advisory (AA24-016A) which disseminates known Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) associated with threat ...

Spookiest Hacks, Cybercriminals and Tactics Lurking in 2023
A Bitdefender study found nearly half of Halloween-themed spam is fraudulent, with 69% of the spam hitting U.S. inboxes ...

HP Report Details Tactics Used to Evade Detection Tools
HP Wolf Security report showed how tactics and techniques cybercriminals use to evade detection are evolving ...

Understanding the Progression of a Ransomware Attack
Everyone should be familiar with ransomware and its impact on businesses by now. But while you may understand the very basics of ransomware, you can’t really protect your organization until you are ...