Page 16 / Picus Labs

Picus Labs is a group of security researchers and practitioners that investigate the cyber threat landscape using commercial, public, and underground sources. Picus Labs helps organizations and individuals strengthen their security posture with its threat-informed approach.

Breach and Attack Simulation Use Cases for MSSPs

Reports

MITRE ATT&CK® Framework Beginners Guide

Article

Achieving SIEM Efficiency with Breach and Attack Simulation

Reports

TTPs Used by REvil (Sodinokibi) Ransomware Gang in Kaseya MSP Supply-Chain ...

Article

Illuminating DarkSide: TTPs, Tools, and Trend Towards Defense Evasion

Reports

UNC2452 (Nobelium) Threat Group Uses GoldMax, GoldFinder, and Sibot Malware

Article

Lazarus (Hidden Cobra) Group Employs HTA Embedded BMP Files

Article

Picus Threat Library Updated for Vulnerability Exploitation Attacks Leverag...

Article

Picus Threat Library Updated for Operation Dianxun Campaign of the Mustang ...

Article

Picus Threat Library Updated for Earth Vetala Campaign of MuddyWater APT Gr...

Article

How to Build a Red Teaming Attack Scenario | Part 2 - Weaponization and Con...

Article

How to Build a Red Teaming Attack Scenario | Part 1 - Bypass Security Contr...

1 ... 16 17 18