- AA22-138B: Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control
- AA22-138A: Threat Actors Exploiting F5 BIG-IP CVE-2022-1388
- AA22-137A: Weak Security Controls and Practices Routinely Exploited for Initial Access
- AA22-131A: Protecting Against Cyber Threats to Managed Service Providers and their Customers
- AA22-117A: 2021 Top Routinely Exploited Vulnerabilities
- AA22-110A: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure
- AA22-108A: TraderTraitor: North Korean State-Sponsored APT Targets Blockchain Companies
- AA22-103A: APT Cyber Tools Targeting ICS/SCADA Devices
- AA22-083A: Tactics, Techniques, and Procedures of Indicted State-Sponsored Russian Cyber Actors Targeting the Energy Sector
- AA22-076A: Strengthening Cybersecurity of SATCOM Network Providers and Customers
- AA22-074A: Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability
- AA22-057A: Destructive Malware Targeting Organizations in Ukraine
- AA22-055A : Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks
- AA22-054A: New Sandworm Malware Cyclops Blink Replaces VPNFilter
- AA22-047A: Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology