Tracking Image
Background image

Blog

Stay updated on recent news and the latest industry trends, and read expert commentary written by the AttackIQ team.

Application Whitelist Bypass

Application whitelisting is a common technique used to prevent execution of unknown or potentially malicious applications. However, this technique can be bypassed if not implemented correctly.

Read More

Bypassing UAC using Registry Keys
User Account Control (UAC) is a Windows feature that helps to prevent unauthorized changes to the system.

Read More

Offensive Defense

Published on: August 17, 2017
The massive escalation of cyber-attacks and subsequent continued successful breaches necessitates that security professionals take a strategic pause. Current cyber defensive operations continue to suffer from protection failures and missed attacker incursions resulting in significant economic loss and/or degradation of capabilities.

Read More

How the Experian Data Breach Case Might Change the Protection of Breach Investigation Reports

Read More

WannaCry Ransomware: Lessons Learned

To combat WannaCry ransomware, identify your attack surface, contain, and test against known threats.

Read More

GameOn! Security Challenge Submission Deadline Extended

Well folks, we’ve been thrilled by the response that we’ve received to our GameOn! Security Challenge since it launched around Black Hat / DEF CON in late July. We’ve got 55 active players so far in various stages of scenario development and submission, covering a broad range of industries, job titles, and experience levels. We’re excited to see the active participation from a good number of students as well, aspiring security professionals who can put their ideas to work and test their effectiveness today even without an IT department or a access to high-end security tools.

Read More

Why We Are Releasing a Free FireDrill Edition

When we started AttackIQ almost three years ago, there was no automated platform to validate that the assumptions you had about your security program were working as assumed. So we began the journey to enable organizations to test, measure and verify the effectiveness of security infrastructure, policies and processes and do this in such a way it could be automated and orchestrated. Along the way we started to create a community amongst our customers. The platform was growing stronger with every user who depended on it to help make data-driven security decisions. A core principle from Day 1 at AttackIQ was to create FireDrill as an open platform...

Read More

Anatomy of a Ransomware Attack

Read More