Top Ten ATT&CK Techniques:The Rise of ‘Hunter-Killer’ Malware

Picus Labs recently analyzed over 600,000 malware samples to identify the ten most common techniques leveraged by attackers.

Watch this webinar to learn about the key findings of the research, including the rise of evasive ‘Hunter-killer’ malware that systematically targets and impairs security controls to achieve its objectives.

You will discover:

The ten most widely used MITRE ATT&CK techniques
Why and how adversary behaviors are evolving
Ways to validate your readiness against sophisticated attacks

Take your on-demand webinar experience to the next level. Access your complimentary document, ''Picus Red Report 2024" and discover the ATT&CK techniques commonly by used malware.
👉 Download your complementary document



Critt Golden, Head of Solution Architects PICUS
Simon Monahan, Product Marketing Lead PICUS