By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: VPNs, vishing and verification: Incoming cyberthreats of 2025
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > VPNs, vishing and verification: Incoming cyberthreats of 2025
Tech News

VPNs, vishing and verification: Incoming cyberthreats of 2025

By Viral Trending Content 8 Min Read
Share
SHARE

Contents
VishingIAM, or am I?Stay clean

Arctic Wolf’s Clare Loveridge discusses some major cyber predictions for the threat landscape this year and how organisations can be prepared.

Last month, cybersecurity company Arctic Wolf released a report detailing its predictions for the threat landscape in 2025.

With an overarching belief that the cybersecurity sector will be primarily influenced by the adaptability and abilities of threat actors, along with their propensity for financial gain, Arctic Wolf  highlighted various attack types and vulnerabilities that it believes will make waves in the cybersecurity world this year.

Major predictions include the increased use of advanced AI for malicious activities, as well as a continued targeting of critical infrastructure for both extortion and preparation for future “hybrid conflicts”.

One of the company’s core predictions for 2025 is that organisations’ perimeter cyber defences will continue to break down as threat actors target virtual private network (VPN) gateways. The report states that the rise of VPN gateways, due in part to remote or partially remote working environments, cyberattackers have gained new opportunities for infiltration. But how can threat actors exploit these gateways?

“The most common way is by exploiting a zero day or unpatched vulnerability in the VPN software,” says Clare Loveridge, VP and general manager for EMEA at Arctic Wolf, who pointed to examples such as Ivanti Connect Secure, which was exploited by threat actors last February and recently targeted in a zero-day attack.

“Threat actors can exploit zero-day or unpatched vulnerabilities by developing or acquiring exploit code that targets vulnerable software or systems. This can enable malicious actions such as unauthorised access, arbitrary code execution, data theft, service disruption or privilege escalation.

“The extent of the damage varies based on the vulnerability’s nature and the attacker’s objectives, potentially resulting in data breaches, system compromise, financial loss, reputational harm or operational shutdowns in critical infrastructure.”

She says there are other ways to exploit VPNs, such as credential theft through advanced phishing techniques, which she says could be a simpler albeit less effective way to breach the software.

“Credential theft would give them sessions, whereas exploiting the software could give them broad access.”

Vishing

One growing cyberthreat that the report highlights is large-scale social engineering campaigns, particularly voice phishing – or ‘vishing’ – attacks, where threat actors use AI and deepfake technology to masquerade as employees to target and deceive company departments that operate remotely.

“Vishing has become very concerning because of the advancements in AI,” says Loveridge. “There has been attacks with video facsimiles of real company executives directing employees to wire money etc. These will only get better over time.”

According to Arctic Wolf’s report, today’s deepfake tools only require a few still photographs – which can easily be sourced from LinkedIn and other social media platforms – to impersonate an employee.

“The best way to protect against this is to educate your employee base on what to look for and how to react to an urgent out-of-character request,” says Loveridge. “Security awareness training is key to this.

“In the vishing scenario specifically, if there is a video interaction with somebody you know, but they are asking for something out of character, use an out-of-band method to connect to that person to confirm the request.”

As Loveridge explains, an out-of-band method refers to a way of verifying information through a separate communication channel different from the one where the request originated. In a scenario where you receive a suspicious communication from someone you know – where they ask for something out of character such as financial assistance or confidential information – Loveridge says you shouldn’t respond directly.

Instead, she recommends calling their phone number from your contacts list to confirm their request, sending them a text or email through a previously established communication channel, or, if feasible, meeting them in person to confirm high-risk requests.

IAM, or am I?

Another core prediction of Arctic Wolf’s report is that cyberattacks such as ransomware will increasingly exploit weaknesses in identity and access management (IAM) systems. IAM infrastructure provides authentication, authorisation and identity management functions for enterprises.

However, while these systems intend to enable the proper management of employee accounts and access, Arctic Wolf warns that errors in these systems – such as overprivileged access,
orphaned accounts and shadow directories – will be taken advantage of by threat actors.

Another factor that threatens these systems is the fact that in some cases, security safeguards are often softened to reduce friction for users.

But where are IAM systems falling flat when it comes to security? Loveridge says the biggest issues are centred around “providing too much privilege and not having adequate multifactor authentication (MFA)”.

In order to prevent a breach to these systems, she says organisations need to ensure that access to critical resources is “restricted to the people who actually need the access and no more”, and to ensure that MFA is used on each critical access with a “something you have and something you know” approach.

“The ‘something you have and something you know’ approach is part of MFA, which enhances security by requiring users to provide two or more different types of credentials to verify their identity,” she explains. “This approach ensures that even if one factor (such as a password) is compromised, the attacker would still need access to the second factor, significantly reducing the risk of unauthorised access.”

The ‘something you know’ refers to knowledge-based credentials that only the user should know, such as passwords, personal identification numbers or security questions, while ‘something you have’ refers to a physical item or a “unique, time-sensitive token that the user possesses”. These could be a smartphone with an authenticator app, a one-time password sent via text or email, or an ID badge.

Stay clean

There’s clearly a lot to watch out for in the modern threat landscape, and so maintaining proper cyber hygiene is more important than ever.

The best way, according to Loveridge, to ensure proper cyber hygiene is to do routine checks, such as the security posture in depth review (SPiDR).

A SPiDR check combines security assessments, configuration reviews and best practice knowledge transfers to improve an organisation’s security posture.

Most of all though, organisations need to proactive and aware.

“Cyber hygiene really hasn’t changed much over the years.  Keep your software and devices patched and do so as quickly as possible,” she says. “Ensure you are using MFA. Have a least privileged or zero-trust approach to security in general.”

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

You Might Also Like

Apple AI Pin Specs Leak: Dual Cameras, No Screen & More

The diverse responsibilities of a principal software engineer

OpenAI Backs Bill That Would Limit Liability for AI-Enabled Mass Deaths or Financial Disasters

Google’s Fitbit Tease has me More Excited for Garmin’s Whoop Rival

Why the TCL NXTPAPER 14 Is One of the Best Tablets for Musicians and Sheet Music Reading

TAGGED: cool tech, latest technology, latest technology news, new technology, science and technology, tech, Tech News, tech review, technews, technological advances, technology definition, technology reviews, what is technology
Share This Article
Facebook Twitter Copy Link
Previous Article Here’s Why The Dogecoin Price Is Crashing Despite The DOGE ETF Filings
Next Article DOOM: The Dark Ages Pre-Orders Receive 2 Days Early Access, Campaign DLC Confirmed
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays
Business
Apple AI Pin Specs Leak: Dual Cameras, No Screen & More
Tech News
A ‘glass-like’ battlefield: German Army chief on the future of warfare
World News
Polymarket Sees Record $153M Daily Volume After Chainlink Integration
Crypto
Natasha Lyonne Then & Now: See Before & After Photos of the Actress Here
Celebrity
Cult Hit Doki Doki Literature Club Fights Removal From Google Play Store Over ‘Depiction Of Sensitive Themes’
Gaming News
Dead as Disco Launches Into Early Access on May 5th, Groovy New Gameplay Released
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays
April 10, 2026
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?