This week on Attack in Action webinars, we analyzed T1086 PowerShell as the no. 2 technique in the Picus 10 Critical MITRE ATT&CK Techniques list.
Picus Labs, the research arm of Picus Security, analyzed around 50.000 malware samples in the last year to determine TTPs used by adversaries in these malicious files. As a result of the comprehensive analysis of tens of thousands of real-world threat samples collected from numerous sources, Picus unrevealed the “Picus 10 Critical MITRE ATT&CK Techniques” to help you focus on what significantly improves your security.
Dr. Carlo Tarantini
Product Marketing Manager, Picus