{
	"id": "5f991d96-fbfd-41a3-9f05-65981a3383cb",
	"created_at": "2026-04-06T00:18:44.006237Z",
	"updated_at": "2026-04-10T03:20:43.126402Z",
	"deleted_at": null,
	"sha1_hash": "8192a9b22dada4dcd93c7cdf39ca701cfd95db4a",
	"title": "Vulnerabilities \u0026 Threats recent news | Dark Reading",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2710159,
	"plain_text": "Vulnerabilities \u0026 Threats recent news | Dark Reading\r\nArchived: 2026-04-05 18:53:30 UTC\r\nTechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa\r\nTechTarget and Informa Tech’s Digital Business Combine.\r\nTogether, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving\r\nan audience of 50+ million professionals with original, objective content from trusted sources. We help you gain\r\ncritical insights and make more informed decisions across your business priorities.\r\nCybersecurity Topics\r\nRelated Topics\r\nApplication Security\r\nCybersecurity Careers\r\nCloud Security\r\nCyber Risk\r\nCyberattacks \u0026 Data Breaches\r\nCybersecurity Analytics\r\nCybersecurity Operations\r\nData Privacy\r\nEndpoint Security\r\nICS/OT Security\r\nIdentity \u0026 Access Mgmt Security\r\nInsider Threats\r\nIoT\r\nMobile Security\r\nPerimeter\r\nPhysical Security\r\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 1 of 11\n\nRemote Workforce\r\nThreat Intelligence\r\nVulnerabilities \u0026 Threats\r\nHome\r\nVulnerabilities \u0026 Threats\r\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 2 of 11\n\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 3 of 11\n\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 4 of 11\n\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 5 of 11\n\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 6 of 11\n\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 7 of 11\n\nPrevious\r\n1\r\n2\r\n3\r\n4\r\n5\r\n…\r\n230\r\nNext\r\nEditor's Choice\r\nWant more Dark Reading stories in your Google search results?\r\n2026 Security Trends \u0026 Outlooks\r\nThreat Intelligence\r\nCybersecurity Predictions for 2026: Navigating the Future of Digital Threats\r\nJan 2, 2026\r\nCyber Risk\r\nNavigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult\r\nJan 12, 2026\r\nEndpoint Security\r\nCISOs Face a Tighter Insurance Market in 2026\r\nJan 5, 2026\r\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 8 of 11\n\nThreat Intelligence\r\n2026: The Year Agentic AI Becomes the Attack-Surface Poster Child\r\nJan 30, 2026\r\nLoading...\r\nKeep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and\r\nemerging trends. Delivered daily or weekly right to your email inbox.\r\nIdentity Maturity Under Pressure: 2026 Findings and How to Catch Up\r\nWed, May 6,2026 at 1pm EST\r\nBuilding a Robust SOC in a Post-AI World\r\nThurs, March 19, 2026 at 1pm EST\r\nRetail Security: Protecting Customer Data and Payment Systems\r\nThurs, April 2, 2026 at 1pm EST\r\nRethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need\r\nWed, April 1, 2026 at 1pm EST\r\nSecuring Remote and Hybrid Work Forecast: Beyond the VPN\r\nTues, March 10, 2026 at 1pm EST\r\nHow Sunrun Transformed Security Operations with AiStrike\r\nAutonomous Pentesting at Machine Speed, Without False Positives\r\nFixing Organizations' Identity Security Posture\r\nBest practices for incident response planning\r\nIndustry Report: AI, SOC, and Modernizing Cybersecurity\r\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 9 of 11\n\nBlack Hat Asia | Marina Bay Sands, Singapore\r\nExperience cutting-edge cybersecurity insights in this four-day event featuring\r\nexpert Briefings on the latest research, Arsenal tool demos, a vibrant Business\r\nHall, networking opportunities, and more. Use code DARKREADING for a Free\r\nBusiness Pass or $200 off a Briefings Pass.\r\nGET YOUR PASS\r\nGISEC GLOBAL 2026\r\nGISEC GLOBAL is the most influential and the largest cybersecurity gathering in\r\nthe Middle East \u0026 Africa, uniting global CISOs, government leaders, technology\r\nbuyers, and ethical hackers for three power-packed days of innovation, strategy,\r\nand live cyber drills.\r\n📌 Book Your Space\r\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 10 of 11\n\nSource: https://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nhttps://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses\r\nPage 11 of 11",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.darkreading.com/vulnerabilities-threats/as-lotl-attacks-evolve-so-must-defenses"
	],
	"report_names": [
		"as-lotl-attacks-evolve-so-must-defenses"
	],
	"threat_actors": [],
	"ts_created_at": 1775434724,
	"ts_updated_at": 1775791243,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/8192a9b22dada4dcd93c7cdf39ca701cfd95db4a.pdf",
		"text": "https://archive.orkl.eu/8192a9b22dada4dcd93c7cdf39ca701cfd95db4a.txt",
		"img": "https://archive.orkl.eu/8192a9b22dada4dcd93c7cdf39ca701cfd95db4a.jpg"
	}
}