Why Security Control Validation is a must for every organization
Article
MedusaLocker Ransomware Analysis, Simulation, and Mitigation
Discover Breach and Attack Simulation at Infosecurity Europe 2022
Virtualization/Sandbox Evasion - How Attackers Avoid Malware Analysis
MITRE ATT&CK T1082 System Information Discovery
Ransomware Attack Detection and Prevention in the Final Phase of the Attack...
Actively Exploited Atlassian Confluence Zero-Day CVE-2022-26134
The Top 4 MITRE ATT&CK Techniques from CISA’s RVA Report and Picus Red Repo...
How we’re building assurance with SOC 2 Type 2 compliance
Microsoft Office CVE-2022-30190 Vulnerability (Follina) Exploitation
Purple Team Automation with Breach and Attack Simulation (BAS)
Masquerading Attacks Explained - MITRE ATT&CK T1036