The Latest in IT Security

Stealing Data By ‘Living Off The Land’

04
Sep
2015

datastealing

Organizations should be on the alert for adversaries attempting to breach their computer systems by using little or no malware in their attacks, warns Dell SecureWorks’ Counter Threat Unit (CTU) senior researcher Phil Burdette.

According to Burdette, cyber criminals are using the target company’s own system credentials and legitimate software administration tools to move freely throughout their network, infecting and collecting valuable data. Burdette, who is part of the CTU operations team, says this has been the method to gain access to networks in nearly all of the intrusions responded to by the Incident Response Team over the past year.

Read More

Leave a reply


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments