Red Team Tools in RDP Attacks

Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...

In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been linked to a massive rogue Remote Desktop Protocol (RDP) campaign. Earth...
New NachoVPN Attack Exploits VPN Clients Flaw To Execute Arbitrary Commands

NachoVPN Attack Exploits RCE Flaws in SonicWall & Palo Alto VPNs

In a study examining popular corporate VPN clients, including traditional SSL-VPN clients and modern Zero Trust solutions, researchers uncovered vulnerabilities in the trust relationships between these VPN clients and their servers. These flaws demonstrated how...
VPN Server Post exploitation technique

Post-Exploitation Tactics Hackers Use After Compromising Ivanti, Fortigate VPN Servers

Akamai researchers have delved into the often-overlooked threat of VPN post-exploitation, highlighting techniques that threat actors can use to escalate their intrusion after compromising a VPN server. The study focuses on vulnerabilities and no-fix...
Hackers Abuse Cloudflare WARP To Hijack Cloud Services

Hackers Abuse Cloudflare WARP To Hijack Cloud Services

Recently, several campaigns have been observed using Cloudflare's WARP service to target susceptible internet-facing services. The primary advantage of utilizing Cloudflare WARP for an attacker is probably the increased anonymity it provides and the decreased...
Beware of Free VPNs that Install Malicious Botnets

Beware of Free VPNs that Install Malicious Botnets

Virtual Private Networks (VPNs) have become essential tools for internet users. However, the allure of free VPN services can sometimes lead to unexpected and dangerous consequences. This article delves into the hidden risks of free...
New VPN Port Shadow Vulnerability Let Hackers Intercept Encrypted Traffic

New VPN Port Shadow Vulnerability Let Hackers Intercept Encrypted Traffic

Researchers examined how connection tracking, a fundamental function in operating systems, can be exploited to compromise VPN security and identified a new attack method named "port shadow" that allows attackers to intercept encrypted traffic,...
Threat Actor Claims to have Unauthorized Fortinet VPN Access to 50+ Organizations

Threat Actor Claims to Have Unauthorized Fortinet VPN Access to 50+ Organizations

A threat actor has claimed to possess unauthorized access to Fortinet VPNs of over 50 organizations in the United States. The alarming announcement was made via a post on the dark web, where the...
Hackers Attacking ERP Server To Deploy Proxy And VPN Services

Hackers Attacking ERP Server To Deploy Proxy And VPN Services

Hackers often attack ERP servers, as these servers contain crucial information about a company's activities and operations, its customers, and various business processes in the organization. Compromising an ERP server can enable a threat actor...
VPN for HIPAA

10 Best VPN for HIPAA Compliance In 2024

In healthcare, strict adherence to the Health Insurance Portability and Accountability Act (HIPAA) is essential, as HIPAA mandates safeguarding sensitive patient data, known as electronic protected health information (ePHI).  Virtual Private Networks (VPNs) come into...
New ‘TunnelVision’ Technique Allows Hackers to Bypass VPN Encryption

New ‘TunnelVision’ Technique Allows Hackers to Bypass VPN Encryption

Security researchers have uncovered a new technique called "TunnelVision" that exposes a fundamental flaw in routing-based Virtual Private Networks (VPNs), potentially allowing attackers to snoop on users' online activities even when they believe their...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...