🛡️ Bitdefender presents CYBERCRIME: From the Frontline—the podcast that takes you inside real-life cyberattacks. In this episode, we’re looking at 35 years of ransomware attacks. The code and targets were simple and small to start, but decades later, the attackers are faster, apply more leverage, and operate more like a business than ever before. 🔊 Topics covered in this episode include: ↪︎ The earliest days of ransomware attacks ↪︎ Ransomware’s evolution to double and...
All content for CYBERCRIME: From the Frontline is the property of Bitdefender and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
🛡️ Bitdefender presents CYBERCRIME: From the Frontline—the podcast that takes you inside real-life cyberattacks. In this episode, we’re looking at 35 years of ransomware attacks. The code and targets were simple and small to start, but decades later, the attackers are faster, apply more leverage, and operate more like a business than ever before. 🔊 Topics covered in this episode include: ↪︎ The earliest days of ransomware attacks ↪︎ Ransomware’s evolution to double and...
When Good Tools Go Bad: Inside Living Off the Land Attacks
CYBERCRIME: From the Frontline
1 hour 3 minutes
8 months ago
When Good Tools Go Bad: Inside Living Off the Land Attacks
🛡️ Bitdefender presents CYBERCRIME: From the Frontline—the podcast that takes you inside real-life cyberattacks. This episode explores how attackers are turning trusted tools into Trojan horses. PowerShell. TeamViewer. WMI. These tools and hundreds more are essential — and attackers know it. 🔊 In this episode: ↪︎ Our Bitdefender panel reveals how legitimate IT tools are being used to carry out stealthy, fileless attacks. ↪︎ 70% of cyberattacks now include Living off the Land (LOTL) tech...
CYBERCRIME: From the Frontline
🛡️ Bitdefender presents CYBERCRIME: From the Frontline—the podcast that takes you inside real-life cyberattacks. In this episode, we’re looking at 35 years of ransomware attacks. The code and targets were simple and small to start, but decades later, the attackers are faster, apply more leverage, and operate more like a business than ever before. 🔊 Topics covered in this episode include: ↪︎ The earliest days of ransomware attacks ↪︎ Ransomware’s evolution to double and...