{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreicq2nj46jnpgmbomkogdyicdpslvlud7bkxgl73qk66hfgeeki7ia",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mlvi7arbxbz2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreifv57qqorrzm4u5rlojgd6yy2lpti5kh4nrj553ei2vs5flpsb7ke"
},
"mimeType": "image/jpeg",
"size": 390818
},
"path": "/2026/05/what-45-days-of-watching-your-own-tools.html",
"publishedAt": "2026-05-15T11:00:00.000Z",
"site": "https://thehackernews.com",
"textContent": "In Your Biggest Security Risk Isn't Malware — It's What You Already Trust, we made a simple argument: the most dangerous activity inside most organizations no longer looks like an attack. It looks like administration. PowerShell, WMIC, netsh, Certutil, MSBuild — the same trusted utilities your IT team uses every day are also the preferred toolkit of modern threat actors. Bitdefender's analysis",
"title": "What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface"
}