Top 10 Technique - Banner-4

Picus Webinars presents T1036 Masquerading, the fourth most commonly used technique used by adversaries in 2019, according to 10 Critical MITRE ATT&CK Techniques Research.

Watch it on-demand webinar where we talked talk about;

  • How adversaries leverage Masquerading, and how it became the fourth most commonly used technique used by adversaries in 2019?
  • What are the use cases by threat actors and their malware? 
  • How do Red Teams simulate the Masquerading technique?
  • How do Blue Teams detect this technique?
  • How can you test the fourth most commonly used technique Masquerading, with Picus in your environment?



Dr. Süleyman Özarslan

Co-Founder, VP of Picus Labs, Picus


Speaker Photo-4

Maximilian Heinemeyer

Director of Threat Hunting, Darktrace 


carlo - 2

Dr. Carlo Tarantini

Product Marketing Manager, Picus


Picus Labs, the research arm of Picus Security, analyzed around 50.000 malware samples in the last year to determine TTPs used by adversaries in these malicious files.  As a result of the comprehensive analysis of tens of thousands of real-world threat samples collected from numerous sources, Picus unrevealed the “Picus 10 Critical MITRE ATT&CK Techniques” to help you focus on what significantly improves your security.