Looking for Attackers in all the wrong places

Attackers do use malware to get into networks, but once they’re in, they’re likely to rely on the same standard IT utilities that you routinely use, so if you’re only looking out for malware, you may be missing them as they operate right under your nose. This conclusion is the result of data on attack activity that was gathered from hundreds of thousands of systems by LightCyber.

Read more here:

http://www.darkreading.com/attacks-breaches/legit-tools-helping-attackers-hide-malicious-activity-study-finds/d/d-id/1326105?

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top