Malicious actors are increasingly exploiting legitimate tools to accomplish their goals, which include disabling security measures, lateral movement, and transferring files. Using commonly available tools allows attackers to evade detection. While custom-built tools or malware can be flagged as malicious by endpoint products, commercially available tools are often marked as clean or allow-listed by organizations. This gives attackers carte blanche to perform their activities without being noticed, as their attacks can be mistaken as part … More

The post Prevent attackers from using legitimate tools against you appeared first on Help Net Security.