Cybersecurity researchers are seeing a new trend of hackers using remote access virtual private networks (VPNs) to gain entry to networks. The attackers are exploiting insufficiently protected VPN accounts for access. Experts recommend businesses use authentication beyond simple passwords, such as certificate-based authentication, while some suggest a shift toward Zero Trust Network Access solutions that limit user access and have better integration with identity management systems.

M&S still rebuilding after April cyber incident – Digital Watch Observatory
Summarize this content to a maximum of 60 words: M&S still rebuilding after April cyber incident Digital Watch Observatory