T1055 Process Injection

May 21, 2020

Picus 10 Critical MITRE ATT&CK Techniques: T1055 Process Injection

Read More
Five Highlights from RSA Conference 2020

March 19, 2020

At the end of February, the RSA Conference 2020 attracted 36,000 participants, 704 speakers, and 658 exhibitors. In this blog post, we highlight five noteworthy themes from the RSA Conference 2020.

Read More
Keep Pace with the Ever Changing Threat Landscape

March 06, 2020

Are you crystal clear on which cyber threats pose a significant risk to your business? In this article, we outline what you need to know to keep pace with the speed of change to reduce your exposure.

Read More
Is your SecOps team at risk because of 'Silent Failure'?

February 15, 2020

Unaware that current security controls are failing in silence. This blog discusses in-depth tips on dwell-time metrics and how to complete these strategies into your security posture?

Read More
Emotet Technical Analysis - Part 2 PowerShell Unveiled

February 08, 2020

We revealed obfuscated Visual Basic codes in the first part of the Emotet Technical Analysis series. In this second part, we analyze the PowerShell script in the VBA codes.

Read More
Emotet Technical Analysis - Part 1 Reveal the Evil Code

January 30, 2020

In this second part, we analyzed the PowerShell codes in the Emotet malware document. Emotet incorporates various obfuscation and evasion techniques to avoid detection, and these techniques change over time.

Read More
A brief history and further technical analysis of Sodinokibi Ransomware

January 15, 2020

Sodinokibi ransomware has been responsible for a series of high-profile attacks since April 2019. In this blog, we analyzed a sample of Sodinokibi ransomware spread by spearphishing emails.

Read More
Cyber Crime Turns Cyber Racket - Tackling Ransomware Before It Hits

January 11, 2020

On New Year’s Eve, foreign currency exchange provider Travelex took all its systems offline following a Sodinokibi ransomware attack. This article reviews emerging ransomware attacks and actionable insights to prevent them.

Read More
Picus recognized as a Cool Vendor 2H19 in Security and Risk Management by Gartner

October 24, 2019

Gartner has just named Picus Security a “Cool Vendor” in Security and Risk Management 2H19. We are thrilled and honored to receive this recognition.

Read More
Vulnerability Scanning, Pentesting, Red Teaming … What’s Next?

June 14, 2019

This blog post discusses where Breach & Attack Simulation (BAS) fits into vulnerability scanning, penetration testing and red teaming continuum.

Read More

Trusted by Leading Global Companies

Exclusive Networks
ING Bank
QNB Finansbank
Yapı Kredi
Datasheet Request Demo Join our Newsletter