Contact: US (877) 838-7947 | UK +44 131 260 3044 Blog | Careers | Contact Us | Client Support

Living off the Land

Dell SecureWorks CTU researchers responded to an intrusion perpetrated by Threat Group-1314 (TG-1314), one of numerous threat groups that employ the “living off the land” technique to conduct their intrusions. Detecting threat actors who are “living off the land,” using credentials, systems, and tools they collect along the way instead of backdoors, can be challenging for organizations that focus their instrumentation and controls primarily on the detection of malware and indicators such as command and control IP addresses, domains, and protocols.

Vulnerability Assessments versus Penetration Tests

As information security professionals, most of you are familiar with vulnerability assessments and penetration testing (pen tests for short). Both are valuable tools that can benefit any information security program and they are both integral components of a Threat and Vulnerability Management process. Are These Information Security Services the Same? The two are often incorrectly used interchangeably […]

Online Tools

  • Print this Page
  • Share This Resource