Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Cyber Resilience Zone HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom HP Reinvent Digital Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 NetApp Digital Newsroom The IoT Integrator Intel Tech Provider Zone NetApp Data Fabric WatchGuard Digital Newsroom

14 Top Cybersecurity Trends To Expect At Black Hat Conference

As Black Hat Conference 2021 kicks off amid vendor cancellations and a surge in COVID-19 cases in Las Vegas, CRN speaks with 14 prominent executives to see what cybersecurity trends they expect to be the talk of this year’s event.

Back 1   2   3   ... 15 Next
photo

Living-Off-The-Land Attacks

Adversaries are increasingly using legitimate tools also employed by the victim organization to stay better hidden by blending into the victim’s traffic, according to Jon Clay, Trend Micro’s vice president of threat intelligence. Legitimate tools can be harnessed to carry out every piece of the attack chain from initial access, asset discovery and lateral movement to data exfiltration and credential theft, Clay said.

Living-off-the-land attacks are a counter-forensic activity since they force businesses to have a mechanism for examining the use of tools like Cobalt Strike, Mimikatz and PS Exec to determine if a particular instance is legitimate or illegitimate, according to Clay. Similar to stealing admin credentials, Clay said adversaries pursuing living-off-the-land attacks can engage in lots of activities that fly under the radar.

Threat actors engage in asset discovery and app discovery when scoping out potential victims to ensure they’re able to blend in by using the same apps and OS as the intended target, Clay said. Trend Micro has documented between 20 and 30 legitimate tools that can also be used by ransomware actors for nefarious purposes, according to Clay.

 
 
Back 1   2   3   ... 15 Next

sponsored resources