Home Search

VPN - search results

If you're not happy with the results, please do another search
Vulnerabilities in Zimbra

CISA Provides Details on Top Routinely Exploited Vulnerabilities in 2020 and 2021

0
Organizations can boost their overall cybersecurity posture by regularly updating their network systems and patch vulnerabilities. Understanding how attackers leverage malicious techniques and the...
CISA VDP platform, U.S. export ban on cybersecurity items

CISA Launches New Vulnerability Disclosure Policy to Boost Cybersecurity

0
Despite regular security audits, attackers continue to intrude on business and government networks by exploiting unpatched vulnerabilities. To help federal civilian agencies in the...
Pegasus Spyware, Mobile Security, spyware

eScan’s Mobile Security Application Capable of Detecting and Blocking Pegasus Spyware

0
Pegasus spyware from the NSO Group has made it to the global mainstream media, thanks to it being at the core of a major...
microsoft, flaws in SonicWall SRA SMA

Ransomware Alert! SonicWall Asks Users to Fix Flaws in SRA and SMA Products

0
Ransomware attacks have become sophisticated and continue to affect the cybersecurity community. The constant development of security defenses has become imperative for organizations amidst...
SolarWinds Microsoft

Chinese Hacking Group ‘DEV 0322’ Exploits SolarWinds Serv-U Software: Microsoft

0
The infamous SolarWinds attacks have left a severe impact on the cybersecurity landscape. While organizations are still recovering from its consequences, Microsoft recently warned...
Nobelium

Russia-based APT28 Linked to Mass Brute-force Attacks Against Cloud Networks

0
State-sponsored actors from Russia have a long history of cyberattacks across the world. There are numerous cyberespionage campaigns linked to Russian hackers. Recently, the...
Korea Atomic Energy Research Institute

North Korean State Actors Potentially Breached Korea Atomic Energy Research Institute

0
Virtual Private Network (VPN) applications that are meant to secure user privacy online are becoming an entry point for intrusions. Threat actors often exploit...
return to office, business, hybrid work

Top 5 Cybersecurity Trends Businesses Should be Aware of in 2021

0
2020 will go down in the annals of corporate history as a game-changing year. Even now, as we slowly begin to emerge from a...
WhatsApp and Indian governmentWhatsapp Hack

The Curious Case of WhatsApp and Government of India Highlights the Broader Traceability Concerns

0
Facebook-owned WhatsApp and the Indian government have been at loggerheads since January this year. However, with no party ready to back down, the WhatsApp...
BotenaGo, malware over encrypted connections

New Malvertising Campaign Found Distributing Trojanized Version of AnyDesk

0
Digital advertising is one of the fastest-growing media. The entire world is hooked to cell phones and hence digital ads are often found on...