Get a Pentest and security assessment of your IT network.

News

8 Legit Tools and Utilities That Cybercriminals Commonly Misuse

Cybercriminals increasingly use tools that are already preinstalled on targeted systems to carry out cyberattacks. Such tools allow attackers to hide their activities in a sea of legitimate traffic. This makes it harder for defenders to spot malicious activity and makes attack attribution much more difficult. Here are eight of the mostly commonly abused legitimate utilities and tools and tools used by cybercriminals, according to security experts at Positive Technologies. Back to Mail Online home: Show us what you think you need to do to fight cybercrime. Back to the page you came from.”]

Source: https://www.darkreading.com/attacks-breaches/8-legit-tools-and-utilities-that-cybercriminals-commonly-misuse

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones