all InfoSec news
How do threat actors laterally move and exploit internal system post-VPN Access?
April 20, 2024, 10:24 a.m. | /u/DENY_ANYANY
cybersecurity www.reddit.com
We often read about incidents where threat actors exploit unpatched vulnerabilities in VPN servers and acquire VPN credentials through phishing emails with malicious attachments or social engineering.
However, I'm trying to deepen my understanding of what happens after they gain access to a victim's VPN.
Once inside the network via VPN, how do attackers typically move laterally to access other systems? How do attackers manage to access internal servers via SSH or RDP? I'm curious how they discover …
access attachments credentials cybersecurity emails engineering exploit friends hello incidents internal malicious phishing phishing emails servers social social engineering system threat threat actors understanding unpatched victim vpn vpn access vulnerabilities
More from www.reddit.com / cybersecurity
How does hiring in APT groups work?
14 hours ago |
www.reddit.com
State of WiFi Security in 2024
15 hours ago |
www.reddit.com
Prioritize Blue Team for Cybersecurity Success
17 hours ago |
www.reddit.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC