Check Point warns of increase in enterprise attacks targeting vulnerable VPNs – SiliconANGLE News

2 minutes, 16 seconds Read

Cybersecurity company Check Point Software Technologies Ltd. is warning that they have seen an increase in threat actors exploiting remote-access virtual private network environments to gain authorized access to enterprises.

Over the last few months, Check Point researchers have observed malicious groups leveraging VPNs as an entry point and attack vector into organizations. The groups aim to discover enterprise assets and users, seeking vulnerabilities to gain persistence on key assets.

Check Point more recently identified a small number of login attempts using old VPN local accounts relying on password-only authentication. It likely goes without saying that password-only authentication is considered insecure, with the researchers recommending that companies should not rely on passwords alone for authentication.

The researchers also identified a vulnerability in Check Point Network Security gateways that potentially allows an attack to read certain information on internet-connected Check Point gateways with remote access VPN or mobile access enabled.

Check Point has released a solution to address the vulnerability, which all customers using Check Point Network Security gateways are advised to implement.

Discussing the news, Patrick Tiquet, vice president of Security and Architecture at cybersecurity company Keeper Security Inc., told SiliconANGLE that “the warning from Check Point is a reminder that threat actors are continually evolving their tactics, highlighting the critical need for enterprises to proactively defend themselves against cyber threats.”

“Attackers exploiting old, insecure local accounts is a reminder that security is an ongoing process, and enterprises must continually update their authentication methods to ensure they are in line with the latest best practices,” Tiquet added. “Reliance on password-only authentication is a glaring vulnerability that can be easily exploited. Enterprises must adopt a layered security approach that includes strong authentication methods, regular security assessments and timely application of security patches.”

Jason Soroko, senior vice president of product at certificate management solutions company Sectigo Ltd., said similarly, noting that “switching from weak authentication to stronger authentication has multiple benefits.”

“Many of today’s enterprise applications already actively support modern alternatives to passwords, by offering certificate-based authentication as the de-facto technology to replace passwords for humans and machines,” Soroko added.

Image: GPT-4o

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU

This post was originally published on the 3rd party site mentioned in the title of this this site

Similar Posts