Tracking Image


Latest AttackIQ community scenarios, AttackIQ experts, as well as other security practitioners like you

Free Community Edition
Background image


Stay updated on recent news and the latest industry trends, and read expert commentary written by the AttackIQ team.

Automated Query Engine: Full scenario coverage, no need to write queries

Our latest Integrations update includes a new approach which makes it easy for FireDrill customers to enable detection of scenario executions. A smart query feature for all FireDrill integrations.

Read More


Enterprise security teams are faced with a growing problem. Advanced adversaries are winning the war, stealing data at will and wreaking havoc on corporate networks.

Read More

AttackIQ New Product Feature - Cyber Hunt Exercise Module

AttackIQ is pleased to announce the release of our Cyber Hunt Exercise Module; a new workflow within FireDrill that enables customers to validate and measure the detection and response capabilities of their Detection Analysts.

Read More

Application Whitelist Bypass

Application whitelisting is a common technique used to prevent execution of unknown or potentially malicious applications. However, this technique can be bypassed if not implemented correctly.

Read More

Bypassing UAC using Registry Keys
User Account Control (UAC) is a Windows feature that helps to prevent unauthorized changes to the system.

Read More

Offensive Defense


The massive escalation of cyber-attacks and subsequent continued successful breaches necessitates that security professionals take a strategic pause. Current cyber defensive operations continue to suffer from protection failures and missed attacker incursions resulting in significant economic loss and/or degradation of capabilities.

Read More

How the Experian Data Breach Case Might Change the Protection of Breach Investigation Reports

Read More

Automating the Extraction of WannaCry IOCs
Friday morning, UTC+1:00. Rumor has it that employees from a big Telecom company in Spain are heading back home. Company loudspeaker recordings and internal emails start being disclosed on the Internet where employees are being told to shut down all the computers immediately.

Read More