all InfoSec news
Laccolith: Hypervisor-Based Adversary Emulation with Anti-Detection
April 30, 2024, 4:11 a.m. | Vittorio Orbinato, Marco Carlo Feliciano, Domenico Cotroneo, Roberto Natella
cs.CR updates on arXiv.org arxiv.org
Abstract: Advanced Persistent Threats (APTs) represent the most threatening form of attack nowadays since they can stay undetected for a long time. Adversary emulation is a proactive approach for preparing against these attacks. However, adversary emulation tools lack the anti-detection abilities of APTs. We introduce Laccolith, a hypervisor-based solution for adversary emulation with anti-detection to fill this gap. We also present an experimental study to compare Laccolith with MITRE CALDERA, a state-of-the-art solution for adversary emulation, …
advanced advanced persistent threats adversary adversary emulation apts arxiv attack attacks can cs.cr csos detection emulation hypervisor persistent persistent threats proactive proactive approach solution threats tools undetected
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
COMM Penetration Tester (PenTest-2), Chantilly, VA OS&CI Job #368
@ Allen Integrated Solutions | Chantilly, Virginia, United States
Consultant Sécurité SI H/F Gouvernance - Risques - Conformité
@ Hifield | Sèvres, France
Infrastructure Consultant
@ Telefonica Tech | Belfast, United Kingdom