EHA
Hackers Abuse Cloudflare WARP To Hijack Cloud Services

Hackers Abuse Cloudflare WARP To Hijack Cloud Services

Recently, several campaigns have been observed using Cloudflare's WARP service to target susceptible internet-facing services. The primary advantage of utilizing Cloudflare WARP for an attacker is probably the increased anonymity it provides and the decreased...
Beware of Free VPNs that Install Malicious Botnets

Beware of Free VPNs that Install Malicious Botnets

Virtual Private Networks (VPNs) have become essential tools for internet users. However, the allure of free VPN services can sometimes lead to unexpected and dangerous consequences. This article delves into the hidden risks of free...
New VPN Port Shadow Vulnerability Let Hackers Intercept Encrypted Traffic

New VPN Port Shadow Vulnerability Let Hackers Intercept Encrypted Traffic

Researchers examined how connection tracking, a fundamental function in operating systems, can be exploited to compromise VPN security and identified a new attack method named "port shadow" that allows attackers to intercept encrypted traffic,...
Threat Actor Claims to have Unauthorized Fortinet VPN Access to 50+ Organizations

Threat Actor Claims to Have Unauthorized Fortinet VPN Access to 50+ Organizations

A threat actor has claimed to possess unauthorized access to Fortinet VPNs of over 50 organizations in the United States. The alarming announcement was made via a post on the dark web, where the...
Hackers Attacking ERP Server To Deploy Proxy And VPN Services

Hackers Attacking ERP Server To Deploy Proxy And VPN Services

Hackers often attack ERP servers, as these servers contain crucial information about a company's activities and operations, its customers, and various business processes in the organization. Compromising an ERP server can enable a threat actor...
VPN for HIPAA

10 Best VPN for HIPAA Compliance In 2024

In healthcare, strict adherence to the Health Insurance Portability and Accountability Act (HIPAA) is essential, as HIPAA mandates safeguarding sensitive patient data, known as electronic protected health information (ePHI).  Virtual Private Networks (VPNs) come into...
New ‘TunnelVision’ Technique Allows Hackers to Bypass VPN Encryption

New ‘TunnelVision’ Technique Allows Hackers to Bypass VPN Encryption

Security researchers have uncovered a new technique called "TunnelVision" that exposes a fundamental flaw in routing-based Virtual Private Networks (VPNs), potentially allowing attackers to snoop on users' online activities even when they believe their...
Hackers Offering Admin Access to 3000 Fortinet SSl-VPN

Hackers Offering Admin Access to 3000 Fortinet SSL-VPN

Hackers are now offering administrative access to over 3000 Fortinet SSL-VPN devices. This breach poses a significant threat to the security of numerous organizations relying on these devices for secure remote access. A tweet from...
Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

A critical vulnerability has been discovered in a widely used virtual private network (VPN) software, Libreswan, putting millions of users at risk. The flaw, CVE-2024-3652, could allow attackers to remotely crash the affected systems,...
Hackers launched 250,000+ Attacks to Exploit Ivanti VPN 0-Day

Hackers launched 250,000+ Attacks to Exploit Ivanti VPN 0-Day

Ivanti Connect Secure vulnerabilities were disclosed in January 2024 as a potential gateway for threat actors to penetrate corporate networks. The two vulnerabilities, CVE-2023-46805 and CVE-2024-21887 were associated with authentication bypass and arbitrary command...

Managed WAF

Website

Latest News