The Latest in IT Security

Living off the land: A security threat to your data

15
Dec
2015

Living-off-the-land

TU-SO further elaborated that in the past year “the threat actors accessed the target environment using compromised credentials and the companies’ own virtual private network (VPN) or other remote access solutions.”

The research team also noted that threat actors were “living off the land,” using credentials, systems and tools they collected along the way instead of backdoors. By using a company’s own tools, the threat actors made it difficult for IT security professionals to distinguish adversary activity from that of legitimate users — pushing detection times out to weeks, months, or even years.

Read More

Leave a reply


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments