
Cyber attackers use images & built-in tools to bypass defences
Research from HP Wolf Security has found that cyber attackers are continually refining established tactics in order to evade security measures and deceive users. Living-off-the-land tactics The HP Threat Insights Report describes an increasing trend in the use of “living-off-the-land” (LOTL) techniques, whereby cybercriminals utilise legitimate tools and features within the operating system to carry…