Category Archives: Cybersecurity

Volt Typhoon targets US critical infrastructure with living-off-the-land techniques

Microsoft has detected stealthly and targeted malicious attacks that are primarily focused on the access of credentials and exploration of network systems following a successful compromise. These operations target essential infrastructure organisations in the United States and are orchestrated by Volt Typhoon, a China-based state sponsored actor , who engages in information gathering and espionage.… Read More »

Understanding “Living Off the Land” Techniques in Cybersecurity

Cyber threats have become more sophisticated and harder to detect. Among evolving cyber threats, one strategy stands out for its stealth and efficacy: the “Living Off the Land” (LOTL) technique. As the cyber threat landscape continues to evolve, understanding such tactics becomes paramount for businesses and individuals alike. What is Living Off the Land? In… Read More »