Hackers Leverage Red Team Tools in RDP Attacks Via TOR & VPN for Data...
In a striking display of cyber sophistication, the advanced persistent threat (APT) group Earth Koshchei, also tracked as APT29 or Midnight Blizzard, has been linked to a massive rogue Remote Desktop Protocol (RDP) campaign.
Earth...
NachoVPN Attack Exploits RCE Flaws in SonicWall & Palo Alto VPNs
In a study examining popular corporate VPN clients, including traditional SSL-VPN clients and modern Zero Trust solutions, researchers uncovered vulnerabilities in the trust relationships between these VPN clients and their servers.
These flaws demonstrated how...
Post-Exploitation Tactics Hackers Use After Compromising Ivanti, Fortigate VPN Servers
Akamai researchers have delved into the often-overlooked threat of VPN post-exploitation, highlighting techniques that threat actors can use to escalate their intrusion after compromising a VPN server. The study focuses on vulnerabilities and no-fix...
Hackers Abuse Cloudflare WARP To Hijack Cloud Services
Recently, several campaigns have been observed using Cloudflare's WARP service to target susceptible internet-facing services.
The primary advantage of utilizing Cloudflare WARP for an attacker is probably the increased anonymity it provides and the decreased...
Beware of Free VPNs that Install Malicious Botnets
Virtual Private Networks (VPNs) have become essential tools for internet users. However, the allure of free VPN services can sometimes lead to unexpected and dangerous consequences.
This article delves into the hidden risks of free...
New VPN Port Shadow Vulnerability Let Hackers Intercept Encrypted Traffic
Researchers examined how connection tracking, a fundamental function in operating systems, can be exploited to compromise VPN security and identified a new attack method named "port shadow" that allows attackers to intercept encrypted traffic,...
Threat Actor Claims to Have Unauthorized Fortinet VPN Access to 50+ Organizations
A threat actor has claimed to possess unauthorized access to Fortinet VPNs of over 50 organizations in the United States.
The alarming announcement was made via a post on the dark web, where the...
Hackers Attacking ERP Server To Deploy Proxy And VPN Services
Hackers often attack ERP servers, as these servers contain crucial information about a company's activities and operations, its customers, and various business processes in the organization.
Compromising an ERP server can enable a threat actor...
10 Best VPN for HIPAA Compliance In 2024
In healthcare, strict adherence to the Health Insurance Portability and Accountability Act (HIPAA) is essential, as HIPAA mandates safeguarding sensitive patient data, known as electronic protected health information (ePHI).
Virtual Private Networks (VPNs) come into...
New ‘TunnelVision’ Technique Allows Hackers to Bypass VPN Encryption
Security researchers have uncovered a new technique called "TunnelVision" that exposes a fundamental flaw in routing-based Virtual Private Networks (VPNs), potentially allowing attackers to snoop on users' online activities even when they believe their...