Tag: vpn
-
Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents
Cybersecurity researchers have unearthed new Android spyware artifacts that are likely affiliated with the Iranian Ministry of Intelligence and Security (MOIS) and have been distributed to targets by masquerading as VPN apps and Starlink, a satellite internet connection service offered by SpaceX.Mobile security vendor Lookout said it discovered four samples of a surveillanceware tool it…
-
ExpressVPN bug leaked user IPs in Remote Desktop sessions
ExpressVPN has fixed a flaw in its Windows client that caused Remote Desktop Protocol (RDP) traffic to bypass the virtual private network (VPN) tunnel, exposing the users’ real IP addresses. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/expressvpn-bug-leaked-user-ips-in-remote-desktop-sessions/
-
Zero Trust Application Access ohne VPN-Komplexität
In der modernen Arbeitswelt haben sich die Anforderungen an die Netzwerksicherheit grundlegend geändert. Mitarbeiter, Dienstleister und Kunden greifen vermehrt von extern und mit verschiedenen Endgeräten auf Applikationen in Unternehmensnetzwerken zu. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/zero-trust-application-access
-
Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon
Threat actors have been actively exploiting vulnerabilities in Ivanti Connect Secure, specifically CVE-2025-0282 and CVE-2025-22457, to deploy advanced malware including MDifyLoader and Cobalt Strike Beacon. These attacks, observed from December 2024 through July 2025, build on prior incidents involving SPAWNCHIMERA and DslogdRAT, demonstrating persistent targeting of VPN appliances. Attackers leverage these flaws for initial access,…
-
Partnerschaft ermöglicht VPN-Service ohne zusätzliche Kosten – Zyxel und Tailscale vereinfachen die sichere Remote-Konnektivität
First seen on security-insider.de Jump to article: www.security-insider.de/zyxel-und-tailscale-vereinfachen-die-sichere-remote-konnektivitaet-a-5ce2ec60281cf29159b26db40ee6033b/
-
Ransomware actors target patched SonicWall SMA devices with rootkit
Tags: access, attack, backdoor, control, credentials, exploit, flaw, incident response, malware, mandiant, network, password, ransomware, security-incident, startup, vpn, vulnerabilitytemp.db and persist.db, that store sensitive information, including user account credentials, session tokens, and OTP seed values.Although the flaw has been publicly documented and analyzed in detail by researchers as potentially leading to the exposure of admin credentials, GTIG and Mandiant don’t have evidence this is the flaw that was exploited. It is also possible…
-
Hide.me VPN Angebot: günstig und anonym durch den Sommer surfen!
Tags: vpnDas Hide.me VPN Angebot: Neue Kunden erhalten beim Abschluss des 24-Monats-Tarifs 3 Monate kostenlos! Das sind monatlich netto nur 2,59 EUR! First seen on tarnkappe.info Jump to article: tarnkappe.info/advertorial/hide-me-vpn-angebot-guenstig-und-anonym-durch-den-sommer-surfen-318191.html
-
VPN Schweiz ohne Logfiles: Warum Swisscows VPN die richtige Wahl ist
Tags: vpnEin VPN Schweiz ohne Logfiles? Dann Swisscows – es geht auch ohne Logfiles. Wir erklären, warum sich für euch ein ausführlicher Blick lohnt. First seen on tarnkappe.info Jump to article: tarnkappe.info/advertorial/vpn-schweiz-ohne-logfiles-warum-swisscows-vpn-die-richtige-wahl-ist-318165.html
-
The 5 Best VPNs for Small Businesses on a Budget
Tags: vpnDiscover the X best VPNs for small businesses in 2025. Compare features, pricing, and find the right fit to protect your team and data. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/networks/best-vpn-for-small-business/
-
SonicWall customers hit by fresh, ongoing attacks targeting fully patched SMA 100 devices
Google Threat Intelligence Group said a financially motivated threat group is abusing the outdated remote access VPN devices, underscoring a continued pattern of threats confronting SonicWall customers. First seen on cyberscoop.com Jump to article: cyberscoop.com/sonicwall-sma100-attacks/
-
Crims hijacking fully patched SonicWall VPNs to deploy stealthy backdoor and rootkit
Someone’s OVERSTEPing the mark First seen on theregister.com Jump to article: www.theregister.com/2025/07/16/sonicwall_vpn_hijack/
-
Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services
The financially driven organization known as Dark Partners has been planning massive cryptocurrency theft since at least May 2025, using a complex network of more than 250 malicious domains that pose as AI tools, VPN services, cryptocurrency wallets, and well-known software brands. This is part of a rapidly developing cybercrime operation. These fake websites, distributed…
-
Hackers Exploit Ivanti and Fortinet VPN Vulnerabilities in Attacks on Japanese Companies
Cyber espionage campaigns against Japanese companies have increased in fiscal year 2024, which runs from April 2024 to March 2025, according to a thorough analysis published by Macnica’s Security Research Center. The main objective of these campaigns is to exfiltrate sensitive data, including manufacturing blueprints, policy-related documents, and personal information. Since initiating monitoring in 2014,…
-
Octalyn Stealer Harvests VPN Configs, Passwords, and Cookies in Organized Folder Structure
The Octalyn Forensic Toolkit, which is openly accessible on GitHub, has been revealed as a powerful credential stealer that poses as a research tool for red teaming and digital forensics. This is a worrying development for cybersecurity. Developed with a C++-based payload module and a Delphi-built graphical user interface (GUI) builder, the toolkit lowers the…
-
How defenders use the dark web
Tags: access, antivirus, attack, breach, corporate, credit-card, crypto, cyber, cybercrime, dark-web, data, data-breach, email, extortion, finance, fraud, government, group, hacker, healthcare, identity, incident, insurance, intelligence, Internet, interpol, law, leak, lockbit, mail, malware, monitoring, network, phishing, ransom, ransomware, service, software, theft, threat, tool, usa, vpnAttributing attacks to threat actors: When organizations suffer from data breaches and cyber incidents, the dark web becomes a crucial tool for defenders, including the impacted businesses, their legal teams, and negotiators.Threat actors such as ransomware groups often attack organizations to encrypt and steal their data so they can extort them for money, in exchange…
-
BulletVPN: Lebenslanges Abo abgeschaltet
Tags: vpnDer VPN-Anbieter BulletVPN hat den gleichnamigen Dienst abgeschaltet. Es gibt in gewisser Weise einen Ersatz. First seen on golem.de Jump to article: www.golem.de/news/bulletvpn-abgeschaltet-lebenslanges-abo-gibt-es-nicht-mehr-2507-198102.html
-
BulletVPN abgeschaltet: Lebenslanges Abo gibt es nicht mehr
Tags: vpnDer VPN-Anbieter BulletVPN hat den gleichnamigen Dienst abgeschaltet. Es gibt in gewisser Weise einen Ersatz. First seen on golem.de Jump to article: www.golem.de/news/bulletvpn-abgeschaltet-lebenslanges-abo-gibt-es-nicht-mehr-2507-198102.html
-
The 10 most common IT security mistakes
Tags: access, attack, backup, best-practice, bsi, business, control, cyber, cyberattack, cybercrime, data, detection, group, incident response, infrastructure, Internet, login, mfa, microsoft, monitoring, network, office, password, ransomware, risk, security-incident, service, skills, strategy, technology, threat, tool, vpn2. Gateway: Weak passwords: The problem: Weak passwords repeatedly make it easier for cybercriminals to gain access to a company network. A domain administrator password with six characters or a local administrator password with only two characters is no obstacle for perpetrators. It is more than clear that this issue is often neglected in practice,…
-
Sichere Konnektivität in der Cloud-Ära: Der Wandel von VPN zu SASE
SASE bietet Remote-Nutzenden einen Zero-Trust-Zugang, der unabhängig von der verwendeten Cloud-Plattform funktioniert inklusive robuster Internetsicherheit und Kontrolle über die Nutzung von SaaS-Anwendungen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/sichere-konnektivitaet-in-der-cloud-aera-der-wandel-von-vpn-zu-sase/a41373/
-
SafePay Ransomware Uses RDP and VPN Access to Infiltrate Organizational Networks
SafePay ransomware has become one of the most active and destructive threat actors in Q1 2025, a shocking development in the cybersecurity scene. According to the Acronis Threat Research Unit (TRU), SafePay has aggressively targeted over 200 victims worldwide, including managed service providers (MSPs) and small-to-midsize businesses (SMBs) across diverse industries. Unlike many ransomware groups…
-
Hackers Exploit GitHub to Distribute Malware Disguised as VPN Software
CYFIRMA has discovered a sophisticated cyberattack campaign in which threat actors are using GitHub to host and disseminate malware masquerading as genuine software. Masquerading as “Free VPN for PC” and “Minecraft Skin Changer,” these malicious payloads are designed to trick users into downloading a dangerous malware dropper named Launch.exe. Hosted on the GitHub repository github[.]com/SAMAIOEC,…
-
From VPN to Hyperscale: Island Reimagines the Browser
Island CEO Mike Fey on Drivers for SASE, Identity Features in Enterprise Browser. Island co-founder and CEO Mike Fey outlines how the enterprise browser is evolving through AI, SASE and hyperscaler investments to enhance governance, reduce backhaul traffic and support secure access across diverse industries such as healthcare and finance. First seen on govinfosecurity.com Jump…
-
Verified, featured, and malicious: RedDirection campaign reveals browser marketplace failures
Browser hijacking and phishing risks: According to their research, the malicious code was embedded in each extension’s background service worker and used browser APIs to monitor tab activity. Captured data, including URLs and unique tracking IDs, was sent to attacker-controlled servers, which in turn provided redirect instructions.The setup enabled several attack scenarios, including redirection to…
-
Ingram Micro Attack Did Not Involve GlobalProtect VPN: Palo Alto Networks
The GlobalProtect VPN was not ‘the source of the vulnerability or impacted’ in the ransomware attack against distribution giant Ingram Micro, Palo Alto Networks says. First seen on crn.com Jump to article: www.crn.com/news/security/2025/ingram-micro-attack-did-not-involve-globalprotect-vpn-palo-alto-networks
-
Der Weg vom VPN zu SASE
Das Appliance-basierte VPN wurde zu einer Zeit und für eine Welt entwickelt, in der die meisten Menschen fünf Tage pro Woche im Büro arbeiteten, Fernzugriff in großem Umfang nicht zum Alltag gehörte und Cloud-Anwendungen selten waren. Seinerzeit war es sinnvoll, den Datenverkehr über eine Handvoll Verbindungspunkte zu zentralisieren. In der modernen Welt mit national und…
-
Zero-Trust per SIM-Karte für IoT und OT
Zscaler erweitert die KI-gestützte Zscaler-Zero-Trust-Exchange-Plattform mit .. Dieser einfach zu implementierende Service ermöglicht Zero-Trust-Kommunikation für IoT- und OT-Geräte durch eine Mobilfunk-SIM-Karte ohne zusätzliche Software oder VPN-Verbindungen. Zscaler-Cellular bietet stabile und sichere Konnektivität, da sich IoT-/OT-Geräte automatisch mit jedem Mobilfunknetz weltweit verbinden. Die zwischengeschaltete Zscaler-Sicherheitsplattform sorgt für den isolierten Datenverkehr, ohne dass eine Angriffsfläche geboten […]…
-
Ransomware-Attacke auf Ingram Micro
Die Webseiten von Ingram Micro sind aufgrund einer Cyberattacke aktuell nicht erreichbar. Screenshot by Foundry / Julia MutzbauerDie Internetseiten des globalen IT-Distributors Ingram Micro sind laut Aussagen von Kunden seit vergangenen Donnerstag (3. Juli 2025) nicht mehr erreichbar. Auch die deutsche Website ist betroffen. Dort heißt es, dass die Seite aufgrund von ‘Wartungsarbeiten” derzeit nicht…
-
DNS over HTTPS Windows: So geht’s ganz einfach
Unser DoH Windows-Guide: Endlich mehr Privatsphäre ohne VPN Schritt für Schritt und in nur wenigen Minuten erklärt und ausgeführt. First seen on tarnkappe.info Jump to article: tarnkappe.info/tutorials/dns-over-https-windows-so-gehts-ganz-einfach-317575.html

