Post-Exploitation Tactics Hackers Use After Compromising Ivanti, Fortigate VPN Servers
Akamai researchers have delved into the often-overlooked threat of VPN post-exploitation, highlighting techniques that threat actors can use to escalate their intrusion after compromising a VPN server. The study focuses on vulnerabilities and no-fix techniques affecting Ivanti Connect Secure and FortiGate VPNs, potentially allowing attackers to gain control over other critical network assets. VPN servers […]
The post Post-Exploitation Tactics Hackers Use After Compromising Ivanti, Fortigate VPN Servers appeared first on Cyber Security News.