Search Results for: VPN Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become... Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,... Blog Post Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts.... Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Knowledge Center VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution... Blog Post VPN Security is Highlighted With Everyone Working From Home March 22, 2020 The Internet is indeed a wonderful invention, but as we all know, risks can be hidden everywhere on the Internet.... Blog Post Find The Best VPN To Stay Safe On The Internet January 10, 2020 Have you ever heard about VPN (Virtual Private Network)? A VPN creates a private tunnel over the open internet in... Blog Post User Data Can be Collected Through VPN and Ad-blocker Apps March 18, 2020 Recently, the well-known mobile application data analysis company Sensor Tower used iOS and Android’s VPN and ad-blocker applications to secretly... Blog Post Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone... Blog Post Iranian Hackers Backdoor Entry Through VPN Servers of Giant Organizations February 25, 2020 After the 2010 Stuxnet worm attack on the Natanz Nuclear plant, Iran has started taking ‘Cyber’ seriously. Towards proving their... Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a... Blog Post Government ID Database Hack for the Entire Population of Argentina January 3, 2022 Allegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to... Blog Post The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities.... Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology... Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a...
Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become...
Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,...
Blog Post Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts....
Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Knowledge Center VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution...
Blog Post VPN Security is Highlighted With Everyone Working From Home March 22, 2020 The Internet is indeed a wonderful invention, but as we all know, risks can be hidden everywhere on the Internet....
Blog Post Find The Best VPN To Stay Safe On The Internet January 10, 2020 Have you ever heard about VPN (Virtual Private Network)? A VPN creates a private tunnel over the open internet in...
Blog Post User Data Can be Collected Through VPN and Ad-blocker Apps March 18, 2020 Recently, the well-known mobile application data analysis company Sensor Tower used iOS and Android’s VPN and ad-blocker applications to secretly...
Blog Post Threat Hunting on Dark Web April 12, 2021 Implementing a good threat hunting strategy helps a company to identify emerging threats and protect against targeted attacks. Monitoring alone...
Blog Post Iranian Hackers Backdoor Entry Through VPN Servers of Giant Organizations February 25, 2020 After the 2010 Stuxnet worm attack on the Natanz Nuclear plant, Iran has started taking ‘Cyber’ seriously. Towards proving their...
Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a...
Blog Post Government ID Database Hack for the Entire Population of Argentina January 3, 2022 Allegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to...
Blog Post The Most Frequent Actively Exploited Vulnerabilities in 2020 February 16, 2021 Every week, security researchers discover and publish many new actively exploited vulnerabilities. In 2020, they disclosed over 18 000 vulnerabilities....
Blog Post What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology...
Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a...