cyber security
SonicWall Firewalls Exploit Hijack SSL VPN Sessions to Gain Networks Access
SonicWall firewalls running specific versions of SonicOS are vulnerable to a critical authentication bypass flaw, tracked as CVE-2024-53704, which allows attackers to hijack active SSL VPN sessions.This vulnerability...
Cyber Security News
Massive Brute Force Attack Launched With 2.8 Million IPs To Hack VPN & Firewall Logins
Massive brute force attacks targeting VPNs and firewalls have surged in recent weeks, with cybercriminals using as many as 2.8 million unique IP addresses...
cyber security
500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability
Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass, is facing scrutiny after the discovery of severe memory...
Cyber Attack
North Korean Hackers Exploit VPN Update Flaw To Breach Networks
North Korean state-sponsored hacking groups, including Kimsuky (APT43) and Andariel (APT45), have significantly increased cyberattacks on South Korean construction and machinery sectors. This surge aligns...
cyber security
Hackers Using VPNs To Exploit Restrictions & Steal Mobile Data
Hackers are offering "free" mobile data access on Telegram channels by exploiting loopholes in telecom provider policies, which target users in Africa and Asia...
Android
Free Android VPNs Suffering Encryption Failures, New Report
VPN apps for Android increase privacy and security over the internet since connection data is encrypted, consequently making it impossible for hackers or other...
Cyber Security News
Cisco Warns Of Massive Brute-Force Attacks Targeting VPNs & SSH Services
Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or get into systems without permission. By systematically trying various combinations of...
cyber security
Bing Ads Exploited by Hackers to Spread SecTopRAT Through NordVPN Mimic
Hackers have been exploiting Microsoft Bing's advertising platform to launch a malvertising campaign that impersonates the reputable VPN service NordVPN.This sophisticated scheme aims...
Android
Beware of Free Android VPN Apps that Turn Your Device into Proxies
Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user devices into proxy nodes, potentially engaging in malicious activities without...
Cyber Attack
8 Common Hacking Techniques & 3 Ways to Avoid Them All
Hackers come in many forms with sophisticated Hacking Techniques, While there has been a lot of discussion about online security in recent years, many...
vpn
Navigating the Digital Frontier: Securely Accessing the Internet with a VPN
In the vast expanse of the digital world, the Internet has woven its intricate web into the very fabric of our lives. As we...