{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreicq2nj46jnpgmbomkogdyicdpslvlud7bkxgl73qk66hfgeeki7ia",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mlvi7arbxbz2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreifv57qqorrzm4u5rlojgd6yy2lpti5kh4nrj553ei2vs5flpsb7ke"
    },
    "mimeType": "image/jpeg",
    "size": 390818
  },
  "path": "/2026/05/what-45-days-of-watching-your-own-tools.html",
  "publishedAt": "2026-05-15T11:00:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "In Your Biggest Security Risk Isn't Malware — It's What You Already Trust, we made a simple argument: the most dangerous activity inside most organizations no longer looks like an attack. It looks like administration. PowerShell, WMIC, netsh, Certutil, MSBuild — the same trusted utilities your IT team uses every day are also the preferred toolkit of modern threat actors. Bitdefender's analysis",
  "title": "What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface"
}