all InfoSec news
How do threat actors laterally move and exploit internal system post-VPN Access?
April 20, 2024, 10:24 a.m. | /u/DENY_ANYANY
cybersecurity www.reddit.com
We often read about incidents where threat actors exploit unpatched vulnerabilities in VPN servers and acquire VPN credentials through phishing emails with malicious attachments or social engineering.
However, I'm trying to deepen my understanding of what happens after they gain access to a victim's VPN.
Once inside the network via VPN, how do attackers typically move laterally to access other systems? How do attackers manage to access internal servers via SSH or RDP? I'm curious how they discover …
access attachments credentials cybersecurity emails engineering exploit friends hello incidents internal malicious phishing phishing emails servers social social engineering system threat threat actors understanding unpatched victim vpn vpn access vulnerabilities
More from www.reddit.com / cybersecurity
Jobs in InfoSec / Cybersecurity
Senior Security Engineer - Detection and Response
@ Fastly, Inc. | US (Remote)
Application Security Engineer
@ Solidigm | Zapopan, Mexico
Defensive Cyber Operations Engineer-Mid
@ ISYS Technologies | Aurora, CO, United States
Manager, Information Security GRC
@ OneTrust | Atlanta, Georgia
Senior Information Security Analyst | IAM
@ EBANX | Curitiba or São Paulo
Senior Information Security Engineer, Cloud Vulnerability Research
@ Google | New York City, USA; New York, USA