Attackers do use malware to get into networks, but once they’re in, they’re likely to rely on the same standard IT utilities that you routinely use, so if you’re only looking out for malware, you may be missing them as they operate right under your nose. This conclusion is the result of data on attack activity that was gathered from hundreds of thousands of systems by LightCyber.
Read more here: