Security News > 2021 > June > Week in review: VPN attacks up nearly 2000%, Root of Trust for the cloud era
Vaccine passports challenged by data privacy and security implicationsWhile some think vaccine apps could be the key to lifting travel restrictions, challenges have arisen regarding data privacy and security implications.
Apple fixes actively exploited vulnerabilities affecting older iDevicesApple has released a security update for older iDevices to fix three vulnerabilities, two of which are zero-days that are apparently actively exploited in attacks in the wild.
VPN attacks up nearly 2000% as companies embrace a hybrid workplaceBecause of the significant increase in VPN and RDP vulnerabilities, malware, botnet and exploitation activity are down compared to Q4, but threat actors are still on the prowl.
As organizations make plans for the post-pandemic hybrid workforce, the report reveals how security behaviors have shifted during the past year, the challenges as organizations transition to a hybrid work model, and why a fundamental shift in security priorities is required.
Can on-prem security experts make the move to the cloud?As cloud computing grows in popularity across all use cases, cloud workloads have never been more attractive to malicious actors.
Coupled with increased reliance on public cloud services and vulnerable enterprise VPNs, large organizations not using zero trust security became more vulnerable to network intrusion attacks.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/ZYpv3V7OlWU/
Related news
- Fortinet VPN design flaw hides successful brute-force attacks (source)
- Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks (source)
- New NachoVPN attack uses rogue VPN servers to install malicious updates (source)
- VPN vulnerabilities, weak credentials fuel ransomware attacks (source)
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)
- Ruijie Networks' Cloud Platform Flaws Could've Exposed 50,000 Devices to Remote Attacks (source)