Redesigning the Network to Fend Off Living-Off-the-Land Tactics
With adversaries increasingly relying on legitimate tools to hide their malicious activities, enterprise defenders have to rethink the network architecture in order to detect and defend against these attacks. Known as “living off the land” (LotL), these tactics refer to how adversaries use native, legitimate tools within the victim’s environment to carry out their attacks. […]


