Picus Security Inc.inPicus SecurityThe Zerologon Vulnerability — How to Test it… Safely!by Süleyman Özarslan, PhDNov 2, 2020Nov 2, 2020
Picus Security Inc.inPicus SecurityHow to Simulate and Detect MITRE ATT&CK T1053 Scheduled Task/Job Tachnique: A Real Command used by…by Süleyman Özarslan, PhDOct 18, 2020Oct 18, 2020
Picus Security Inc.inPicus SecurityHow to Bypass WAFs for OS Command Injectionby Süleyman Özarslan, PhDOct 1, 2020Oct 1, 2020
Picus Security Inc.inPicus SecurityThe Most Used Persistence Technique by Adversaries: MITRE ATT&CK T1053 Scheduled Task/Jobby Süleyman Özarslan, PhDSep 29, 2020Sep 29, 2020
Picus Security Inc.inPicus SecurityMITRE ATT&CK T1064 ScriptingSüleyman Özarslan, PhDSep 23, 2020Sep 23, 2020
Picus Security Inc.inPicus SecurityHackers’ Favourite Scripting Languages Part 1: MITRE ATT&CK T1064 Scripting Techniqueby Süleyman Özarslan, PhDSep 21, 2020Sep 21, 2020
Picus Security Inc.inPicus SecurityMITRE ATT&CK T1059 Command Line Interfaceby Süleyman Özarslan, PhDSep 15, 2020Sep 15, 2020
Picus Security Inc.From pentesting to red teaming: Security testing solutions comparedby Armagan ZalogluAug 17, 2020Aug 17, 2020
Picus Security Inc.5 requirements for an effective security testing solutionby Armagan ZalogluAug 17, 2020Aug 17, 2020