{"id":15329,"date":"2022-11-03T20:32:08","date_gmt":"2022-11-03T19:32:08","guid":{"rendered":"https:\/\/www.show.it\/offense-gets-the-glory-but-defense-wins-the-game\/"},"modified":"2022-11-03T20:32:08","modified_gmt":"2022-11-03T19:32:08","slug":"offense-gets-the-glory-but-defense-wins-the-game","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/offense-gets-the-glory-but-defense-wins-the-game\/","title":{"rendered":"Offense Gets the Glory, but Defense Wins the Game"},"content":{"rendered":"<p><span><span>When it comes to cybercriminals, defense evasion remains the top tactic globally. In fact, it was the most employed tactic by malware developers in the past six months \u2013 and they\u2019re often using system binary proxy execution to do so. Hiding malicious intentions is one of the most important actions for adversaries. Therefore, they are attempting to evade defenses by masking malicious intention and attempting to hide commands using a legitimate certificate.<\/span><\/span><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/offense-gets-glory-defense-wins-game\" target=\"_blank\" rel=\"noopener\">read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to cybercriminals, defense evasion remains the top tactic globally. In fact, it was the most employed tactic by malware developers in the past six months \u2013 and they\u2019re often using system binary proxy execution to do so. Hiding malicious intentions is one of the most important actions for adversaries. Therefore, they are [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":15330,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15,39,18],"tags":[],"class_list":["post-15329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-incident-response","category-industry-insights","category-risk-management"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/15329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=15329"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/15329\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media\/15330"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=15329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=15329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=15329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}