Published inPicus Security·PinnedFireEye’s Leaked Red Team Tools Are Mostly Based on Open Source Projects - A Detailed AnalysisWe analyzed 60 tools leaked from FireEye Red Team’s arsenal to understand the impact of this breach. We found that 43% of tools are based on public tools. Our analysis shows that this breach will not have high impact on organizations. — Originally published at https://www.picussecurity.com/resource/blog/techniques-tactics-procedures-utilized-by-fireeye-red-team-tools We have been routinely reading about new breaches this year, but this last incident is different from all others we have heard so far. FireEye, like all security vendors, fighting for a good cause. …Cybersecurity8 min readCybersecurity8 min read
Published inPicus Security·Jan 24, 2022Three Key Ransomware Trends in 2022: RaaS, Multiple Extortion, and IABs3 ransomware trends you need to know in 2022: Ransomware as a Service (RaaS), Quintuple Extortion, and Initial Access Brokers (IABs) Originally published at https://www.picussecurity.com/resource/blog/3-ransomware-trends-you-need-to-know-in-2022-raas-multiple-extortion-iabs Ransomware has become a powerful tool with a profitable revenue model for cyber threat actors in recent years. It is a widespread and well-known threat to organizations today. Ransomware attacks’ impact on organizations can be substantial, causing significant disruption to daily operations and even resulting in…Ransomware4 min readRansomware4 min read
Published inPicus Security·Jan 23, 2022Purple Academy Provides Open-Access (Free) Online Cyber Security CoursesPurple Academy by Picus is committed to developing and constantly improving a learning platform that enables the cybersecurity community to advance their knowledge and skills. — Picus created Purple Academy to help cybersecurity professionals in developing in developing offensive and defensive skills necessary to defend organizations. Purple Academy provides Massive Open Online Courses (MOOC). Purple Academy includes different learning paths. Each learning path provides the necessary micro-courses to develop a specific skill. Micro-courses in learning paths…Cybersecurity5 min readCybersecurity5 min read
Published inPicus Security·Nov 23, 2020The Most Used MITRE ATT&CK Technique: T1055 Process InjectionOur industry-leading Red Team in Picus Labs, meticulously analyzed 48,813 malware samples to understand and describe the tactics, techniques, and procedures (TTPs) used by adversaries in these malicious files. …Cybersecurity3 min readCybersecurity3 min read
May 13, 201630 Online Malware Analysis Sandboxes / Static Analyzers:Update (June 28, 2018): I compare results of sandboxes with a new TrickBot sample (SHA256:dd89e57513612ebcd917d6644b97a92fb074d5dab7da6bd7e5ac4bd93ba20219/, first submission: 2018–06–26 14:56:28) Sandboxes that can detect the malware (ordered by name): Anlyz https://sandbox.anlyz.io Result: Malicious Any.run https://app.any.run Result: Malicious Activity Comodo Valkyrie (https://valkyrie.comodo.com) Result: MalwareMalware2 min readMalware2 min read