article thumbnail

CVE-2024-22394 Exposed: SonicWall SSL-VPN’s Authentication Flaw

Penetration Testing

Recently, a critical flaw, nestled within the SSL-VPN feature of SonicWall’s SonicOS, has been brought to light, exposing a gap wide enough for remote attackers to slip through unnoticed.

article thumbnail

Penetration Testing Remote Workers

SecureWorld News

With many organizations now planning their annual penetration tests ("pentest" for short), a change is needed in order to accommodate remote workers. It also begs what are you allowed to test versus what is now considered taboo considering end-users may be operating with their own personal equipment?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DNA testing company fined after customer data theft

Malwarebytes

DDC said it conducts both inventory assessment and penetration testing on its systems. But since it was unaware of the unused databases, they were not included during the tests as the assessments focused only on those with active customer data.

article thumbnail

Resilience lies with security: Securing remote access for your business

Webroot

The most popular options include virtual private network (VPN) or remote desktop protocol (RDP). VPN works by initiating a secure connection over the internet through data encryption. One downside of using a VPN connection involves vulnerability. One downside of using a VPN connection involves vulnerability.

VPN 110
article thumbnail

15 Cybersecurity Measures for the Cloud Era

Security Affairs

Authentication. Two-factor authentication is another important security measure for the cloud era. Increasingly, passwordless authentication is becoming the norm. When you access the internet through a VPN, your data is encrypted and routed through a secure tunnel. Audits and penetration testing.

article thumbnail

16 Remote Access Security Best Practices to Implement

eSecurity Planet

The technologies for secure remote access can range from VPNs and multi-factor authentication to more advanced access and zero trust controls. Strong passwords, two-factor authentication, firewalls, encryption, and monitoring systems are just a few of the tools and procedures used to maintain security.

article thumbnail

Cyber Best Practices for Overseas Asset Security

SecureWorld News

If you can mandate strong password policies and multi-factor authentication (MFA) for systems and data, you'll work wonders in preserving valuable data in transit. Setting up reputable business VPN connections on all employee devices will prove valuable when they need to access highly sensitive information.