Tag: vpn
-
Attackers steal data from Salesforce instances via compromised AI live chat tool
What Salesloft Drift users should do next: The GTIG report and the Salesloft advisories include indicators of compromise such as IP addresses used by the attackers and User-Agent strings for the tools they used to access the data. Mandiant advises companies to also search logs for any activity from known Tor exit nodes in addition…
-
5 Enterprise VPN Solutions Every Business Should Know
Enterprise VPN provides an encrypted connection for remote users and sites to access corporate resources over the internet. Compare top VPN providers. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/products/enterprise-vpn-solutions/
-
Chinese APT Leverages Proxy and VPN Services to Obfuscate Infrastructure
Tags: apt, china, cyber, cybersecurity, data, group, infrastructure, korea, leak, north-korea, service, threat, vpnA significant data dump surfaced on DDoSecrets.com, purportedly extracted from a workstation belonging to a threat actor targeting organizations in South Korea and Taiwan. The leak, detailed in an accompanying article, attributes the activity to the North Korean advanced persistent threat (APT) group known as Kimsuky, a sophisticated actor previously highlighted in cybersecurity advisories for…
-
Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by millions are covertly connected AND insecure Three … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/24/week-in-review-covertly-connected-and-insecure-android-vpn-apps-apple-fixes-exploited-zero-day/
-
Featured Chrome extension FreeVPN.One caught capturing and transmitting user data
Tags: access, api, browser, ceo, chrome, corporate, credentials, data, data-breach, endpoint, finance, governance, healthcare, india, malicious, mobile, monitoring, privacy, risk, technology, threat, tool, vpn, vulnerability, vulnerability-managementUnmanaged extensions expose enterprises: Such incidents highlight how unmanaged browser extensions can act as covert data exfiltration channels, exposing sensitive corporate information. Enterprises usually deploy licensed, corporate-grade VPNs that are safe and accompanied by monitoring and access controls. But employees often install free VPN extensions for personal use.”This poses as a major threat to industries…
-
Google yet to take down ‘screenshot-grabbing’ Chrome VPN extension
Researcher claims extension didn’t start out by exfiltrating info… while dev says its actions are ‘compliant’ First seen on theregister.com Jump to article: www.theregister.com/2025/08/21/freevpn_privacy_research/
-
Mule Operators in META Adopt Advanced Fraud Schemes
A new report has mapped the tactical evolution of mule operators in the META region from VPNs to advanced fraud networks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/mule-operators-meta-advanced-fraud/
-
Mule Operators in META Adopt Advanced Fraud Schemes
A new report has mapped the tactical evolution of mule operators in the META region from VPNs to advanced fraud networks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/mule-operators-meta-advanced-fraud/
-
End well, this won’t: UK commissioner suggests govt stops kids from using VPNs
Dame Rachel de Souza says under-18s are laughing off the Online Safety Act’s age blocks First seen on theregister.com Jump to article: www.theregister.com/2025/08/19/uk_commissioner_suggests_govt_stop/
-
Legitimate Chrome VPN with 100K+ Installs Secretly Captures Screenshots and Exfiltrates Sensitive Data
A Chrome extension marketed as FreeVPN.One, boasting over 100,000 installations, a verified badge, and featured placement in the Chrome Web Store, has been exposed as spyware that silently captures screenshots of users’ browsing activities and exfiltrates them to remote servers. Despite its privacy policy explicitly stating that the developer does not collect or use user…
-
New Research Reveals Security Vulnerabilities Linked to Popular VPN Apps
Researchers have uncovered deceptive practices among major VPN providers, linking seemingly independent entities into three distinct >>families
-
Citizen Lab Reports Hidden VPN Networks Sharing Ownership and Security Flaws
Citizen Lab’s new report, Hidden Links, uncovers a network of VPN providers like Turbo VPN and VPN Monster… First seen on hackread.com Jump to article: hackread.com/citizen-lab-vpn-networks-sharing-ownership-security-flaws/
-
Android VPN apps used by millions are covertly connected AND insecure
Three families of Android VPN apps, with a combined 700 million-plus Google Play downloads, are secretly linked, according to a group of researchers from Arizona State … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/19/android-vpn-apps-used-by-millions-are-covertly-connected-and-insecure/
-
Citizen Lab Reports Hidden VPN Networks Sharing Ownership and Security Flaws
Citizen Lab’s new report, Hidden Links, uncovers a network of VPN providers like Turbo VPN and VPN Monster… First seen on hackread.com Jump to article: hackread.com/citizen-lab-vpn-networks-sharing-ownership-security-flaws/
-
Legitimate Chrome VPN Extension Turns to Browser Spyware
Researchers detected that FreeVPN.One, a longstanding Chrome Web Store VPN extension, recently turned into spyware First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chrome-vpn-extension-spyware/
-
Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager
Cybersecurity researchers are warning of a “significant spike” in brute-force traffic aimed at Fortinet SSL VPN devices.The coordinated activity, per threat intelligence firm GreyNoise, was observed on August 3, 2025, with over 780 unique IP addresses participating in the effort.As many as 56 unique IP addresses have been detected over the past 24 hours. All…
-
SonicWall VPN Cyberattack Linked to Known Access Control Vulnerability
SonicWall identified under 40 security incidents and determined the access control problem was related to a vulnerability published last year. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-sonicwall-vpn-threat-activity/
-
Fortinet SSL VPN Targeted by Hackers from 780 Unique IP Addresses
Cybersecurity researchers at GreyNoise have detected an alarming surge in brute-force attacks against Fortinet SSL VPN systems, with over 780 unique IP addresses launching coordinated attacks in a single day”, marking the highest daily volume recorded for this type of attack in recent months. The sophisticated campaign appears to represent a significant escalation in targeting…
-
9 things CISOs need know about the dark web
Tags: 2fa, access, ai, attack, automation, backup, blockchain, botnet, breach, captcha, ceo, ciso, communications, corporate, credentials, crypto, cyber, cybercrime, cybersecurity, dark-web, data, data-breach, ddos, deep-fake, defense, detection, dns, exploit, extortion, finance, fraud, group, guide, hacking, identity, incident, incident response, infrastructure, intelligence, international, jobs, law, leak, lockbit, malicious, malware, marketplace, mfa, monitoring, network, open-source, phishing, privacy, ransomware, resilience, risk, russia, saas, scam, service, strategy, tactics, technology, threat, tool, training, vpn, vulnerability, zero-dayNew groups form after major marketplaces are disrupted: International takedown efforts damage infrastructure and curb cybercrime operations by disrupting larger operations, removing major players from the ecosystem and scattering user bases.However, the dark web is highly adaptive and sophisticated actors often maintain contingency plans, including mirrors, backups, and alternative forums, according to Edward Currie, associate…
-
Disable Your SonicWall VPN: Threat Actors May Be Exploiting This Vulnerability
SonicWall and other threat researchers are investigating the ongoing incidents. It’s unknown yet whether this is a new or established vulnerability. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-sonicwall-vpn-threat-activity/
-
MSPs encouraged to tighten up security defences
Fears of attacks that exploit VPN vulnerabilities and compromise networks has underlined the need for the channel to remain vigilant First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366628856/MSPs-encouraged-tio-tighten-up-security-defences
-
VexTrio TDS Deploys Malicious VPN Apps on Google Play and App Store
VexTrio, a sophisticated threat actor known for operating a massive traffic distribution system (TDS), has expanded its malicious activities by deploying fake VPN applications on major app stores, including Google Play and the Apple App Store. Originating from a merger between Italian spammers and Eastern European developers around 2020, VexTrio’s TDS facilitates the redirection of…
-
UK proxy traffic surges as users consider VPN alternatives amid Online Safety Act
Tags: vpnIt’s ‘more than a temporary trend,’ Decodo claims First seen on theregister.com Jump to article: www.theregister.com/2025/08/08/proxy_usage_jumps_in_uk/
-
What is a CISO? The top IT security leader role explained
Tags: access, authentication, breach, business, ceo, cio, cisa, ciso, compliance, computer, container, control, corporate, credentials, cyber, cybersecurity, data, ddos, defense, dns, encryption, exploit, finance, firewall, framework, fraud, guide, Hardware, healthcare, infosec, infrastructure, intelligence, international, jobs, kubernetes, mitigation, msp, mssp, network, nist, programming, RedTeam, regulation, risk, risk-management, security-incident, service, skills, software, strategy, technology, threat, training, vpn, zero-day, zero-trust. You’ll often hear people say the difference between the two is that CISOs focus entirely on information security issues, while a CSOs remit is wider, also taking in physical security as well as risk management.But reality is messier. Many companies, especially smaller ones, have only one C-level security officer, called a CSO, with IT…
-
Cloud Speicher Lifetime Deal: Sichere dir diesen Online-Speicher, VPN und Virenschutz mit 87 % Rabatt!
Der Cloud Speicher Lifetime Deal von Internxt. Schütze deine Online-Privatsphäre und spare bares Geld bei nur einem Abo für alles Wichtige. First seen on tarnkappe.info Jump to article: tarnkappe.info/advertorial/cloud-speicher-lifetime-deal-sichere-dir-diesen-online-speicher-vpn-und-virenschutz-mit-87-rabatt-319266.html
-
Cloud Speicher Lifetime Deal: Sichere dir diesen Online-Speicher, VPN und Virenschutz mit 87 % Rabatt!
Der Cloud Speicher Lifetime Deal von Internxt. Schütze deine Online-Privatsphäre und spare bares Geld bei nur einem Abo für alles Wichtige. First seen on tarnkappe.info Jump to article: tarnkappe.info/advertorial/cloud-speicher-lifetime-deal-sichere-dir-diesen-online-speicher-vpn-und-virenschutz-mit-87-rabatt-319266.html
-
SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day
SonicWall has revealed that the recent spike in activity targeting its Gen 7 and newer firewalls with SSL VPN enabled is related to an older, now-patched bug and password reuse.”We now have high confidence that the recent SSL VPN activity is not connected to a zero-day vulnerability,” the company said. “Instead, there is a significant…
-
Warnung vor Angriffen auf SonicWall Firewalls (SSL-VPNs)
Jemand unter der Blog-Leserschaft, der auf SonicWall setzt. Seit Tagen gibt es Berichte, dass Angriffe auf SonicWall Firewalls beobachtet werden. Es scheint sich auf die SSL VPN-Funktion der Gen 7 SonicWall Firewalls zu beziehen. Unklar ist, ob eine unbekannte Schwachstelle … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/07/warnung-vor-angriffen-auf-sonicwall-firewalls/
-
Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities
Tags: breach, credentials, cyber, data, defense, exploit, extortion, group, msp, ransomware, service, threat, vpn, vulnerabilityThe Acronis Threat Research Unit (TRU) dissected recent samples from the Akira and Lynx ransomware families, revealing incremental enhancements in their ransomware-as-a-service (RaaS) models and double-extortion strategies. Both groups leverage stolen credentials, VPN vulnerabilities, reconnaissance, privilege escalation, defense evasion, and data exfiltration to infiltrate systems, primarily targeting small and medium-sized businesses (SMBs) with recycled yet…

