July 16, 2020
This week on Attack in Action webinars, we analyzed T1003 Credential Dumping as the no. 3 technique in the Picus 10 Critical MITRE ATT&CK Techniques list.
In this episode of Attack in Action webinars, we analyzed T1086 PowerShell as the no. 2 technique in the Picus 10 Critical MITRE ATT&CK Techniques list.
Picus Labs, the research arm of Picus Security, analyzed around 50.000 malware samples in the last year to determine TTPs used by adversaries in these malicious files.
The MITRE ATT&CK Framework is a living and growing knowledge base of adversary tactics and techniques that have been observed from real-world attacks. It allows security teams to better understand hacker attacks - moreover, both Government and private sectors leverage MITRE ATT&CK to develop specific threat models and methodologies.
The MITRE ATT&CK® Framework is a living and growing knowledge base of adversary tactics and techniques that have been observed from real-world attacks. ATT&CK enables security teams to better understand cyber intrusions, providing a threat-centric defense approach against emerging threats.
Online channels where employees communicate about many vital issues while interacting with their internal and external stakeholders, became the number one topic on cybersecurity because of hackers. For instance, Zoom becomes the de facto video conferencing tool during the COVID-19 pandemic, concerns over its security have spilled over into the mainstream.
COVID-19 has affected the cybersecurity posture of businesses today. The major issue with Remote Work lies within security as it leaves businesses exposed. We will cover how blue teams can take action in unpredictable times to remain secure.