<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Megawire</provider_name><provider_url>https://megawire.com</provider_url><title>Living Off the Land: How Hackers Exploit Construction Network Tools - Megawire</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="MnHCVWus11"&gt;&lt;a href="https://megawire.com/living-off-the-land-how-hackers-exploit-construction-network-tools/"&gt;Living Off the Land: How Hackers Exploit Construction Network Tools&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://megawire.com/living-off-the-land-how-hackers-exploit-construction-network-tools/embed/#?secret=MnHCVWus11" width="600" height="338" title="&#x201C;Living Off the Land: How Hackers Exploit Construction Network Tools&#x201D; &#x2014; Megawire" data-secret="MnHCVWus11" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://megawire.com/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://megawire.com/wp-content/uploads/2024/12/megawire_living_off_the_land_how_hackers_exploit_construction_network_tools-01.jpg</thumbnail_url><thumbnail_width>2101</thumbnail_width><thumbnail_height>1127</thumbnail_height><description>In the ever-evolving landscape of cybersecurity, &#x201C;Living Off the Land&#x201D; (LOTL) attacks are becoming a favoured strategy for hackers, particularly within sectors like construction and contracting, where networked tools and remote operations are prevalent. Unlike traditional cyberattacks that rely on external malware or obvious intrusion methods, LOTL attacks exploit legitimate tools, software, and protocols already [&hellip;]</description></oembed>
