Tracking Image
Get Your Free Community Edition

SIGN UP TODAY!
Free Community Edition
Background image

Blog

Stay updated on recent news and the latest industry trends, and read expert commentary written by the AttackIQ team.

Is your Gold Disk putting you At Risk?
If your environment security testing plan does not start with your “gold disk,” there is a chance that you are actually introducing new attack surfaces with every new gold disk image that you deploy on your network.

Read More

Automated Query Engine: Full scenario coverage, no need to write queries

Our latest Integrations update includes a new approach which makes it easy for FireDrill customers to enable detection of scenario executions. A smart query feature for all FireDrill integrations.

Read More

MITRE ATT&CK Module

Enterprise security teams are faced with a growing problem. Advanced adversaries are winning the war, stealing data at will and wreaking havoc on corporate networks.

Read More

AttackIQ New Product Feature - Cyber Hunt Exercise Module

AttackIQ is pleased to announce the release of our Cyber Hunt Exercise Module; a new workflow within FireDrill that enables customers to validate and measure the detection and response capabilities of their Detection Analysts.

Read More

Application Whitelist Bypass

Application whitelisting is a common technique used to prevent execution of unknown or potentially malicious applications. However, this technique can be bypassed if not implemented correctly.

Read More

Bypassing UAC using Registry Keys
User Account Control (UAC) is a Windows feature that helps to prevent unauthorized changes to the system.

Read More