An Attack via VPN – Really?

I was just made aware of a case study, which is a really interesting "attack" on a US company via VPN. It is sometimes not like it seems…

You should read this: Case Study: Pro-active Log Review Might Be A Good Idea


Skip to main content