Attackers hide behind legit IT tools and services

Security researchers have been tracking a trend: attackers are (mis)using popular cloud services for distributing malware and infiltrating targeted systems, which helps them to evade detection. They can also use legit forensics tools to steal logon credentials data, or even repurpose patch management systems to distribute their own malicious code.

Read more about it:

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top