Perimeter
Breaking news, news analysis, and expert commentary on threats to the network perimeter, and the tools & technologies for securing it.
A woman typing on a keyboard in the background and digital spheres connected to one another in the foreground. The middle one says VPN
Threat IntelligenceAttackers Target Check Point VPNs to Access Corporate NetworksAttackers Target Check Point VPNs to Access Corporate Networks
Using VPNs as an initial access vector is ironic, given that security is the very reason enterprises employ them in the first place.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.