Huseyin Can YUCEELinPicus SecurityThe Most Used ATT&CK Technique — T1059 Command and Scripting InterpreterIn recent years, every research and publication related to the MITRE ATT&CK for Enterprise matrix shows that T1059 Command and Scripting…Sep 2, 2022Sep 2, 2022
Huseyin Can YUCEELinPicus SecurityHow Attackers Inhibit System Recovery — Four Methods with Red Team ScenariosTechniques to destruct Windows recovery mechanisms — volume shadow copy, startup repair, restore points, system backups, and backup catalogMar 22, 2022Mar 22, 2022
Huseyin Can YUCEELinPicus SecurityThe Most Prevalent Ransomware TTP — MITRE ATT&CK T1486 Data Encrypted for ImpactOriginally published at https://www.picussecurity.com/resource/the-most-common-ransomware-ttp-mitre-attck-t1486-data-encrypted-for-impactMar 14, 2022Mar 14, 2022