Cybersecurity researchers are seeing a new trend of hackers using remote access virtual private networks (VPNs) to gain entry to networks. The attackers are exploiting insufficiently protected VPN accounts for access. Experts recommend businesses use authentication beyond simple passwords, such as certificate-based authentication, while some suggest a shift toward Zero Trust Network Access solutions that limit user access and have better integration with identity management systems.

Novel malware from Russia’s APT28 prompts LLMs to create malicious Windows commands – csoonline.com
Novel malware from Russia’s APT28 prompts LLMs to create malicious Windows commands csoonline.com