Cyber attackers use images & built-in tools to bypass defences

Research from HP Wolf Security has found that cyber attackers are continually refining established tactics in order to evade security measures and deceive users. Living-off-the-land tactics The HP Threat Insights Report describes an increasing trend in the use of “living-off-the-land” (LOTL) techniques, whereby cybercriminals utilise legitimate tools and features within the operating system to carry…

Read More

SonicWall Patches Multi Vulnerabilities in NetExtender VPN Client

SonicWall has issued a security advisory disclosing three newly identified vulnerabilities in its NetExtender Windows client, a popular VPN tool used by organizations for secure remote access to internal networks. SonicWall outlined three distinct vulnerabilities affecting NetExtender for Windows versions 10.3.1 and earlier: CVE-2025-23008 — Improper Privilege Management (CVSS 7.2) This high-severity flaw allows a low-privileged attacker…

Read More

56% of Cyberattacks Bypass Security With Legitimate Logins – Report

Newly released 2025 Sophos Active Adversary Report revealed,50 % cyberattacks in 2024 bypassed traditional security defenses by using legitimate login credentials. The report, which analysed over 400 cases of Managed Detection and Response (MDR) and Incident Response (IR), revealed that 56 percent of cyberattacks were executed by adversaries simply logging in rather than breaking in….

Read More