Cyber Resilience – VPN Exploitation, Don’t Blindly Trust Your VPN
From ransomware groups to state-sponsored actors, multiple cyber threat actor types are exploiting vulnerabilities on edge devices and remote services. Edge devices should be considered among the critical assets of any organization and the security of such devices should be one of the highest priorities. This includes VPNs, as a compromised VPN server could allow attackers to easily gain control over other critical assets in the network.