An attacker’s toolchest: Living off the land

This article has been indexed from

Security Blog G Data Software AG

If you’ve been keeping up with the information security world, you’ve certainly heard that recent ransomware attacks and other advanced persistent threats are sometimes using special kind of tools. But for the most part, the tools will be very familiar to you.

Read the original article: