"Living Off the Land" attacks use built-in tools and processes instead of traditional malware.
As enterprises increasing depend on cloud services, living off the land has evolved into living off the cloud.