Picus Security Inc.inPicus SecurityThe Zerologon Vulnerability — How to Test it… Safely!by Süleyman Özarslan, PhD3 min read·Nov 2, 2020----
Picus Security Inc.inPicus SecurityHow to Simulate and Detect MITRE ATT&CK T1053 Scheduled Task/Job Tachnique: A Real Command used by…by Süleyman Özarslan, PhD2 min read·Oct 18, 2020----
Picus Security Inc.inPicus SecurityHow to Bypass WAFs for OS Command Injectionby Süleyman Özarslan, PhD5 min read·Oct 1, 2020----
Picus Security Inc.inPicus SecurityThe Most Used Persistence Technique by Adversaries: MITRE ATT&CK T1053 Scheduled Task/Jobby Süleyman Özarslan, PhD6 min read·Sep 29, 2020----
Picus Security Inc.inPicus SecurityMITRE ATT&CK T1064 ScriptingSüleyman Özarslan, PhD4 min read·Sep 23, 2020----
Picus Security Inc.inPicus SecurityHackers’ Favourite Scripting Languages Part 1: MITRE ATT&CK T1064 Scripting Techniqueby Süleyman Özarslan, PhD7 min read·Sep 21, 2020----
Picus Security Inc.inPicus SecurityMITRE ATT&CK T1059 Command Line Interfaceby Süleyman Özarslan, PhD7 min read·Sep 15, 2020----
Picus Security Inc.From pentesting to red teaming: Security testing solutions comparedby Armagan Zaloglu5 min read·Aug 17, 2020----
Picus Security Inc.MITRE ATT&CK T1036 Masqueradingby Süleyman Özarslan, PhD10 min read·Aug 17, 2020----
Picus Security Inc.5 requirements for an effective security testing solutionby Armagan Zaloglu4 min read·Aug 17, 2020----