Network Security

Vulnerability in Totolink Range Extender Firmware Allows Unauthorized Access
Endpoint Security
Vulnerability in Totolink Range Extender Firmware Allows Unauthorized Access
Totolink range extenders are at risk due to a firmware bug that leads to unauthenticated root-level Telnet service, allowing potential device takeovers. Security researchers encourage ...
D-Link Routers Face New Threat as Attackers Exploit Legacy Vulnerability
Endpoint Security
D-Link Routers Face New Threat as Attackers Exploit Legacy Vulnerability
Threat actors have been exploiting a command injection vulnerability identified in out-of-support D-Link DSL router models. The flaw allows remote execution of malicious commands, compromising ...
NordVPN Denies Salesforce Server Breach Claims, Clarifying Access to Dummy Data
Application Security
NordVPN Denies Salesforce Server Breach Claims, Clarifying Access to Dummy Data
NordVPN denied allegations of a breach on its Salesforce development servers, clarifying that the accessed data was from a third-party test platform's dummy data.
Active Exploitation of FortiOS SSL VPN Vulnerability CVE-2020-12812 Noted
CVE Vulnerability Alerts
Active Exploitation of FortiOS SSL VPN Vulnerability CVE-2020-12812
Fortinet has identified ongoing exploitation of the five-year-old FortiOS SSL VPN flaw CVE-2020-12812, revealing it poses significant risks in specific configurations.
Sophisticated Cybercrime Campaign Targets VPN Vulnerabilities
Application Security
Sophisticated Cybercrime Campaign Targets VPN Vulnerabilities
Cybercriminals are exploiting vulnerabilities in VPN platforms such as Palo Alto Networks GlobalProtect and Cisco SSL VPN using automated campaigns. These attacks focus on credential-based ...
Windows 11 Security Updates Interrupt Enterprise VPN Connectivity
Network Security
Windows 11 Security Updates Interrupt Enterprise VPN Connectivity
Businesses using Windows Subsystem for Linux (WSL) on Windows 11 face VPN issues after Microsoft’s latest security updates. Learn about potential workarounds.
SoundCloud's VPN Restrictions Lead to Access Denials for Users
Cybersecurity
SoundCloud’s VPN Restrictions Lead to Access Denials for Users
Users attempting to access SoundCloud via VPN connections are encountering a 403 forbidden error, resulting in blocked access to the audio streaming platform. This issue ...
PyStoreRAT New JavaScript-Based RAT Distributed via GitHub
Cybersecurity
PyStoreRAT: New JavaScript-Based RAT Distributed via GitHub
Cybersecurity experts uncover a new campaign using GitHub-hosted Python repositories to deploy PyStoreRAT, a JavaScript-based Remote Access Trojan. The threat disguises itself within repositories posing ...
Man Sentenced for Running Evil Twin Network at Australian Airports
Cybersecurity
Man Sentenced for Running “Evil Twin” Network at Australian Airports
A 44-year-old man was sentenced in Australia to over seven years in prison for creating an "evil twin" WiFi network to steal data from travelers ...
ShadowV2 Botnet Malware Exploits IoT Vulnerabilities in D-Link and TP-Link Devices
Network Security
ShadowV2 Botnet Malware Exploits IoT Vulnerabilities in D-Link and TP-Link Devices
The ShadowV2, a new Mirai-based botnet, threatens IoT security by exploiting known vulnerabilities in devices from D-Link, TP-Link, and other vendors.