ATT&CK in Action #8: T1060 Registry Run Keys / Startup Folder
On this episode, we analyzed the 8th most commonly used MITRE ATT&CK Technique by adversaries according to Picus 10 Critical MITRE ATT&CK Techniques list.
Watch it on-demand webinar where we talked about:
- How do adversaries leverage T1060 Registry Run Keys / Startup Folder into their targets?
- What are the significant benefits that T1060 provides for adversaries?
- What are the use cases by threat actors and their malware?
- How do Red Teams simulate this Task technique?
- How do Blue Teams detect this technique?
- How can you test Registry Run Keys / Startup Folder with Picus in your environment?