NSA, CISA Release Guidance on Selecting and Hardening Remote Access VPNs – HS Today – hstoday.us

npressfetimg-6682.png

The National Security Agency and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Information Sheet today detailing factors to consider when choosing a virtual private network (VPN) and top configurations for deploying it securely.  “Selecting and Hardening Remote Access VPN Solutions” also will help leaders in the Department of Defense, National Security Systems and the Defense Industrial Base better understand the risks associated with VPNs.

VPN servers are entry points into protected networks, making them attractive targets. Multiple nation-state advanced persistent threat (APT) actors have weaponized common vulnerabilities and exposures (CVEs) to gain access to vulnerable VPN devices. Exploitation of these CVEs can enable a malicious actor to steal credentials, remotely execute code, weaken encrypted traffic’s cryptography, hijack encrypted traffic sessions, and read sensitive data from the device. If successful, these effects usually lead to further malicious access and could result in a large-scale compromise to the corporate network.

The Information Sheet details considerations for selecting a remote access VPN, as well as actions to harden the VPN from compromise. Top hardening recommendations include using tested and validated VPN products on the National Information Assurance Partnership (NIAP) Product Compliant List, employing strong authentication methods like multi-factor authentication, promptly applying patches and updates, and reducing the VPN’s attack surface by disabling non-VPN-related features.

NSA is releasing this guidance as part of our mission to help secure the Department of Defense, National Security Systems and the Defense Industrial Base.

For more details on how to select a secure VPN and further harden your network, read the full Information Sheet here.

For more cybersecurity guidance, visit NSA.gov/cybersecurity.

Read more at NSA

Source: https://www.hstoday.us/federal-pages/dhs/nsa-cisa-release-guidance-on-selecting-and-hardening-remote-access-vpns/

npressfetimg-1249.png
Remote access

Remote Access to Government and Courts is Needlessly Eroding – GlobeNewswire

TORRANCE, Calif., Jan. 31, 2023 (GLOBE NEWSWIRE) — Tragically, it is now almost a daily occurrence for courts and government bodies of all sizes across the nation to eliminate or restrict remote public access and partic…….

Read More
npressfetimg-1176.png
Remote access

New Python malware backdoors VMware ESXi servers for remote access – BleepingComputer

A previously undocumented Python backdoor targeting VMware ESXi servers has been spotted, enabling hackers to execute commands remotely on a compromised system.

VMware ESXi is a virtualization platform commonly used in the enterprise to host numerous servers on one device while using CPU and memory resources more effectively.

The new backdoor was discovered by Juniper Ne…….

Read More
npressfetimg-1103.png
Remote access

Industrial Remote Access Market Size 2023 Global Development … – Digital Journal

PRESS RELEASE

Published January 24, 2023

[Newest Report with 102 Pages] : Industrial Remote Access Market Outlook report covers segment by Applications (Machine Manufacturer, Line Manufacturer, System Integrator), By Types (Industrial VPN Router, Software System) and offers extensive forecasts from 2023-2029.

[No. of Pages 102] | Pre and Post Covid is Covered and Report is Av…….

Read More