#living-off-the-land

[ follow ]
#cybersecurity
fromThe Hacker News
1 day ago
Information security

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
fromIT Pro
11 months ago
Information security

Malware free attacks: The threat to businesses

Malware free attacks leveraging existing tools are increasingly becoming the common method of cyber attacks against businesses.
Information security
fromThe Hacker News
1 day ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromIT Pro
11 months ago

Malware free attacks: The threat to businesses

Malware free attacks leveraging existing tools are increasingly becoming the common method of cyber attacks against businesses.
fromThe Hacker News
2 months ago

Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators

Security teams are still catching malware. The problem is what they're not catching. More attacks today don't arrive as files. They don't drop binaries. They don't trigger classic alerts. Instead, they run quietly through tools that already exist inside the environment - scripts, remote access, browsers, and developer workflows. That shift is creating a blind spot. Join us for a deep-dive technical session with the Zscaler Internet Access team.
Information security
fromThe Hacker News
5 months ago

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

According to the U.S. government, it's assessed to be a publicly-traded, Beijing-based company known as Integrity Technology Group. "The group cleverly modified a geo-mapping application's Java server object extension (SOE) into a functioning web shell," the cybersecurity company said in a report shared with The Hacker News. "By gating access with a hardcoded key for exclusive control and embedding it in system backups, they achieved deep, long-term persistence that could survive a full system recovery."
Information security
[ Load more ]