July 01, 2020

Once adversaries establish initial access in a system, one of their primary objectives is finding credentials to access other resources and systems in the environment. As a mechanism to obtain account login and password information – credentials –  Credential Dumping is the third most frequently used MITRE ATT&CK technique in our list.

Read More

June 30, 2020

Keeping up with new cyber security threats is a fundamentally unfair game. Thankfully, there’s a way security leaders can gain insight into emerging threats and stay on top of their security investments, and it’s through security testing, or security validation.

Read More

June 22, 2020

PowerShell is a powerful interactive command-line shell and scripting language installed by default on Windows operating systems. Read the blog and discover T1086 PowerShell as the no. 2 technique in the Picus 10 Critical MITRE ATT&CK Techniques list.

Read More

May 21, 2020

Read the blog to discover T1055 Process Injection as the no. 1 technique in the Picus 10 Critical MITRE ATT&CK Techniques list.

Read More

March 19, 2020

At the end of February, the RSA Conference 2020 attracted 36,000 participants, 704 speakers, and 658 exhibitors. In this blog post, we highlight five noteworthy themes from the RSA Conference 2020.

Read More
Keep Pace with the Ever Changing Threat Landscape

March 06, 2020

Are you crystal clear on which cyber threats pose a significant risk to your business? In this article, we outline what you need to know to keep pace with the speed of change to reduce your exposure.

Read More

February 15, 2020

Unaware that current security controls are failing in silence. This blog discusses in-depth tips on dwell-time metrics and how to complete these strategies into your security posture?

Read More

February 08, 2020

We revealed obfuscated Visual Basic codes in the first part of the Emotet Technical Analysis series. In this second part, we analyze the PowerShell script in the VBA codes.

Read More

January 30, 2020

In this second part, we analyzed the PowerShell codes in the Emotet malware document. Emotet incorporates various obfuscation and evasion techniques to avoid detection, and these techniques change over time.

Read More

January 15, 2020

Sodinokibi ransomware has been responsible for a series of high-profile attacks since April 2019. In this blog, we analyzed a sample of Sodinokibi ransomware spread by spearphishing emails.

Read More
Cyber Crime Turns Cyber Racket - Tackling Ransomware Before It Hits

January 11, 2020

On New Year’s Eve, foreign currency exchange provider Travelex took all its systems offline following a Sodinokibi ransomware attack. This article reviews emerging ransomware attacks and actionable insights to prevent them.

Read More
Picus recognized as a Cool Vendor 2H19 in Security and Risk Management by Gartner

October 24, 2019

Gartner has just named Picus Security a “Cool Vendor” in Security and Risk Management 2H19. We are thrilled and honored to receive this recognition.

Read More

Trusted by Leading Global Companies

Exclusive Networks
ING Bank
QNB Finansbank
Yapı Kredi
Datasheet Request Demo Join our Newsletter