Skip to content
  Tuesday 14 April 2026
Trending
April 28, 2024Cybersecurity Engineer (HSM – Data Encryption) December 24, 2023Lead Cybersecurity Analyst February 29, 2024Rhysida Attempts to Sell Children’s Hospital Data for $3.4M September 26, 2023High-Tech Industry Bears the Brunt of NLX-Tagged Attack Traffic, Accounting for 46% July 30, 2025Junior Cybersecurity & Desktop Support Analyst October 8, 2024Technology, Risk & Controls Lead – Cybersecurity Governance September 28, 2025Embedded Cybersecurity Engineer January 16, 2024Principal Cybersecurity Governance Analyst August 22, 2025<h3>Netskope’s IPO Unveils Skyrocketing Sales and Reduced Losses</h3> January 16, 2025<h3>Google Colab vs Jupyter Notebook: Discover the Key Differences</h3>
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Potential Threats: 11 Malicious Activities Enabled by Living-Off-The-Land Binaries
Industry News

Potential Threats: 11 Malicious Activities Enabled by Living-Off-The-Land Binaries

Mister CybersecurityMister Cybersecurity—August 17, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail



Cybersecurity researchers have found a set of 11 living-off-the-land binaries-and-scripts (LOLBAS) that could possibly be used by attackers to conduct post-exploitation actions. LOLBAS is a technique that makes use of system binaries and scripts for malicious functions, making it tough for safety groups to tell apart between official and malicious actions. The Israeli cybersecurity firm, Pentera, uncovered 9 LOLBAS downloaders and three executors that might permit adversaries to obtain and execute extra superior malware on contaminated hosts. These embody varied information reminiscent of MsoHtmEd.exe, Mspub.exe, and InstallUtil.exe. Attackers can use LOLBAS downloaders to acquire extra sturdy malware after which execute it in a stealthy means utilizing LOLBAS executors, showing as a part of a official course of tree on the system. Pentera additionally talked about that attackers may make the most of executables from software program exterior of Microsoft to realize related objectives.

Additionally, Vectra lately disclosed a possible assault vector that exploits the Microsoft Entra ID cross-tenant synchronization (CTS) function to facilitate lateral motion between linked tenants. This implies that an attacker in a compromised setting can use an current CTS configuration to maneuver laterally from one tenant to a different, assuming they’ve already compromised a privileged id within the cloud setting. Alternatively, an attacker in a compromised tenant can deploy a rogue Cross Tenant (*11*) configuration to take care of persistent entry. It is essential for organizations to concentrate on these vulnerabilities and take applicable measures to guard their techniques and knowledge.



Source hyperlink

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

New Yashma Ransomware Variant Focuses on Several English-Speaking Nations
New Malware Campaign Focuses on Inexperienced Cyber Criminals, Leveraging OpenBullet Configs
Related posts
  • Related posts
  • More from author
Industry News

AI Is Transforming EDI Compliance Services

March 27, 20260
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Senior Manager, Cybersecurity Detection Engineering

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • CISA Adds Two Known Exploited Vulnerabilities to Catalog
  • Lead Cybersecurity WAF Engineer
  • Senior Manager, Cybersecurity Detection Engineering
  • Lead Cybersecurity WAF Engineer
  • Lead Cybersecurity WAF Engineer

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures