Check Point Urges VPN Configuration Review Amid Attack Spike

These attacks did not exploit a vulnerability but instead leveraged weaker authentication methods

This article has been indexed from www.infosecurity-magazine.com

Read the original article: