Advertisement

virtual private network (VPN)

The four most frequently exploited vulnerabilities were all contained in edge devices, such as VPNs, firewalls and routers. (Getty Images)

Attackers hit security device defects hard in 2024

Mandiant said exploits were the most common initial access vector last year, linking software defects to 1 in 3 attacks. The most commonly exploited vulnerabilities affected network…
A replica of the Soviet Banner of Victory flies by a WWII memorial in the city of Kherson on May 20, 2022, amid the ongoing Russian military occupation of the region. (Photo by ANDREY BORODULIN/AFP via Getty Images)

Mixed results for Russia’s aggressive Ukraine information war, experts say

Russia want to control the internet in occupied Ukraine to feed the population disinformation — and to prevent Ukrainians from sharing video of Russian troops with Ukrainian…
Advertisement
A sign for the National Security Agency (NSA), U.S. Cyber Command and Central Security Service, is seen near the visitor’s entrance to the headquarters of the NSA at the entrance in Fort Meade, Maryland, February 14, 2018. (Photo by SAUL LOEB/AFP via Getty Images)

NSA, CISA share guidelines for securing VPNs as hacking groups keep busy

"VPN servers are entry points into protected networks, making them attractive targets," said an NSA official.
Advertisement
Advertisement