• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
uncover lots attacks hiding in trusted tools — learn how

Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session

You are here: Home / General Cyber Security News / Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
June 19, 2025

Most cyberattacks today don’t start with loud alarms or broken firewalls. They start quietly—inside tools and websites your business already trusts.

It’s called “Living Off Trusted Sites” (LOTS)—and it’s the new favorite strategy of modern attackers. Instead of breaking in, they blend in.

Hackers are using well-known platforms like Google, Microsoft, Dropbox, and Slack as launchpads. They hide malicious code inside routine traffic, making it incredibly difficult for traditional defenses to detect them.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


And here’s the scary part: many security teams don’t even realize it’s happening—until it’s too late.

Why You’re Not Seeing These Attacks

LOTS tactics don’t look suspicious at first glance. There’s no malware signature to flag, and no unusual IP address to trace. It’s legitimate traffic—until it’s not.

Attackers are exploiting:

  • Common business tools like Teams, Zoom, and GitHub
  • Shortened or vanity URLs to redirect users
  • Trusted cloud services to host malicious payloads

In short, they’re using your trust against you.

What You’ll Learn in This Free Webinar

Join Zscaler’s top threat hunters for “Threat Hunting Insights from the World’s Largest Security Cloud”—a must-attend webinar revealing how stealthy LOTS attacks are detected and stopped in real time. Get frontline tactics to outsmart threats hiding in trusted tools.

You’ll discover:

  • 🔍 The latest LOTS attack techniques seen in real environments
  • 🛠️ How threat hunters caught stealthy attackers hiding inside “normal” traffic
  • 🚨 What trusted tools are being misused right now by threat actors
  • 🔐 Simple, proven ways to improve LOTS detection and reduce risk
  • 🔭 What’s coming next: trends shaping the future of stealth-based attacks

This session is for anyone responsible for defending their organization—whether you’re a security leader trying to stay ahead of evolving threats, a threat hunter sharpening your detection skills, or part of an IT or SOC team overwhelmed by false positives and stealthy attacks. If your company relies on SaaS apps, cloud platforms, or collaborative tools, you’re already a target—and LOTS tactics are designed to slip past unnoticed.

Watch this Webinar

Attackers today aren’t trying to break in—they’re blending in. By hiding inside trusted tools and platforms, they bypass traditional defenses and operate in plain sight. This webinar gives you rare access to real-world detection stories and techniques from experts who analyze trillions of security signals every day inside the world’s largest inline security cloud.

Reserve your seat now to gain exclusive frontline insights, proven tactics, and smarter strategies that could save your team hours—and stop attacks before they succeed.

.webinar-button {display: inline-block; background-color: #4469f5; border: 1px solid #d9dfef; font-size: 0.9rem; padding: 0.5rem 1rem; border-radius: 5px; text-decoration: none; color: #ffffff !important; letter-spacing: 0.5px;}

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «russian apt29 exploits gmail app passwords to bypass 2fa in Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
Next Post: Secure Vibe Coding: The Complete New Guide secure vibe coding: the complete new guide»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.