AttackIQ
@AttackIQ
Followers
7K
Following
1K
Media
2K
Statuses
4K
Adversarial Exposure Validation Platform
Santa Clara, CA
Joined August 2013
As AI adoption accelerates, understanding threats to AI-enabled systems & how to defend them is crucial. The MITRE ATLAS Fall release adds new case studies, AI agent & deepfake techniques, & fresh mitigations to help defenders stay ahead. See what’s new: https://t.co/qSh13bIxhC
0
0
1
Sandworm is one of the most destructive state-backed actors in operation today. Here's how to stay ahead: 📖 Read the new assessment 🧪 Test your controls against Sandworm TTPs 💪 Build confidence in your defenses Read the full analysis: https://t.co/CqiBVLmeOf
#GRU
0
0
0
🐍 SideWinder has spent a decade perfecting espionage—targeting military & gov networks across South Asia and the Middle East. Our latest attack graph emulates their full chain: spear-phishing, CVE-2017-11882, & StealerBot. 📘 Read the full breakdown: https://t.co/MxiZOtfX3U
0
0
1
Humbled by the trust defenders place in us. Inspired to keep building tools and training that make a difference. 💜 👉 Explore what makes us “outstanding”: https://t.co/x8m2oQ3yQO
0
0
0
Complexity doesn’t make your security program mature — it makes it fragile. Register for the upcoming session to learn how to: ✅ Build feedback loops that drive results ✅ Turn constraints into efficiency 🎓 Earn 1 ISC2 CPE credit. Register now: https://t.co/mY4UngpxtH
0
0
0
An attack on Hyundai’s IT services arm exposed data from Hyundai, Kia, and Genesis customers — up to 2M people affected. When sensitive data like Social Security numbers and driver’s licenses are stolen, the risk doesn’t expire. Full story 👉
cybernews.com
Hyundai AutoEver America (HAEA), the official automotive IT services provider for Hyundai, Kia, and Genesis brands, is notifying customers of a data breach.
1
0
0
Ransomware’s early titans—REvil, DarkSide, and BlackMatter—changed everything. Their tactics still live on. The latest Ransom Tales: Volume V revisits their playbooks to help defenders test, learn, and strengthen resilience. 🔗Read the full blog: https://t.co/xNnvI8sK14
0
2
4
“The line between eCrime and state-sponsored attacks is blurring.” Francis Guibernau explains how RomCom RAT evolved from a simple backdoor to a modular, multi-use threat—and why defenders must focus on behavioral detection and resilience. 🔗 https://t.co/YjFTkTOD85
@UniteAi
unite.ai
Francis Guibernau is a Senior Adversary Research Engineer and member of the Adversary Research Team (ART) at AttackIQ. Francis conducts in-depth threat research and analysis to design and create...
0
1
1
🩹 Patching speed ≠ Security 🧩 Visibility + Validation + Prioritization = Resilience Gartner’s Continuous Threat Exposure Management (CTEM) Roadmap shows how to evolve from reactive patching to proactive exposure management. 👉 Get the report: https://t.co/P9wu1Iw68T
0
0
0
CTEM gives security leaders a framework to move from tactical fixes to measurable progress. In this session, "Demystifying CTEM for CISOs", we unpack the five stages of CTEM and show how to make them work in your environment. 🎥 Watch the session: https://t.co/Vla3WtkGMH
0
0
0
Our latest Validated Zero Trust 101 guide breaks down: • The full 7-pillar DoD model • How to validate each pillar against real adversary behavior • What measurable Zero Trust maturity actually looks like https://t.co/9rnqsNvR9M
attackiq.com
Wondering how to adopt a zero trust mindset for your organization? This guide is for you.
0
0
0
Which of the following is not a pillar in the DoD Zero Trust Maturity Model (ZTMM)?
1
0
0
☁️ Cloud security never stands still. ☁️ We’ve expanded our AWS CloudTrail and Deployment Health Check assessments to reflect the latest adversary TTPs, AWS updates, and customer needs—helping teams uncover blind spots before attackers do. 🔗Learn more: https://t.co/mpIgC6IC8Z
0
1
1
👻 Don’t let unknown exposures haunt your defenses. As risk rises and budgets tighten, CISOs need visibility, not guesswork. 🔦 Join us next Thursday, 10/30 to learn how to operationalize CTEM and keep the real monsters out of your network. 🎃 Register: https://t.co/E2RqMu1QQm
0
0
0
Learn how to fight detection entropy with clear evidence and fewer, stronger rules. ✅ Score → Prune → Prove ✅ 4D framework: Resilience, Impact, Readiness, Relevance Turn chaos into clarity. 🎓 Free course: https://t.co/8UFIXxKtZ1
#CyberSecurity #DetectionEngineering #SOC
0
0
0
💡 “Exposure management can be an unbelievably powerful framework—it delivers the why.” – Ben Lim It’s not just about patching vulnerabilities, it’s about connecting risk to real adversary behavior and business impact. 🎥 Watch the full convo: https://t.co/cT7OfhPyMC
#CTEM
0
0
0
In his new interview with @safetydet , Paul Reid, VP of Adversary Research at AttackIQ, breaks down: ⚡ How RomCom is transforming 🌍 Why espionage & cybercrimeoverlap 🔬Why only continuous validation proves defense Read more: https://t.co/5qN5YBUcSb
#RomCom #Ransomware
safetydetectives.com
SafetyDetectives sat down with Paul Reid, Vice President of Adversary Research at AttackIQ, to talk about turning threat intelligence into evidence-based defens
1
0
2
Can you spot the difference? 👀 Some exposures are obvious. The real ones hide in your defenses—misconfigs, weak detections, failed controls. That’s where AttackIQ Flex comes in. ⚡ Start testing instantly: https://t.co/lxOVJBtutT
0
0
0
Global Group burst onto the RaaS scene with AI chatbots and affiliate perks. But under the surface? It’s Mamona and BlackLock reborn. Our team emulated the campaign to help defenders validate ransomware resilience. 🔗 https://t.co/k8zWVnGru1
#AdversaryResearch
0
0
1
🔥 Big news! Jonathan Baker joins AttackIQ as our new VP of Threat-Informed Defense. A 23-year MITRE veteran and CTID Co-Founder, Jon helped define threat-informed defense itself. Now he’s bringing that mission to AttackIQ. Read his latest blog → https://t.co/Odg2IDPLUf
0
0
1