Application Security
Breaking news, news analysis, and expert commentary on application security, including tools & technologies.
A woman typing on a keyboard in the background and digital spheres connected to one another in the foreground. The middle one says VPN
Threat IntelligenceAttackers Target Check Point VPNs to Access Corporate NetworksAttackers Target Check Point VPNs to Access Corporate Networks
Using VPNs as an initial access vector is ironic, given that security is the very reason enterprises employ them in the first place.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.