Blog New VPN Credential Attack Goes to Great Lengths to Obtain Access October 6, 2024 A new “so-phish-ticated” attack uses phone calls, social engineering, lookalike domains, and impersonated company VPN sites to gain initial access to a victim network. About The Author See author's posts Popular Stories Right nowEmbarking on a Compliance Journey? Here’s How Intruder Can HelpState-aligned actors are increasingly deploying ransomware – and that’s bad news for everyoneAstalavista.com – Security Community – Official Re-Launch Video Post Views: 22 Continue Reading Previous: Don’t Put Real Answers Into Your Password Reset QuestionsNext: EPSS vs. CVSS: What’s the Best Approach to Vulnerability Prioritization? Leave a Reply Cancel replyYou must be logged in to post a comment. Related Stories 98% Spike in Phishing Campaigns Leveraging Russian (.ru) Domains Blog 98% Spike in Phishing Campaigns Leveraging Russian (.ru) Domains March 18, 2025 GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories Blog GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories March 18, 2025 THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More Blog THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More March 18, 2025