Resources and insights

The latest industry news, interviews, technologies, and resources.

Credential Stuffing: Why Businesses Must Act in 2022

Credential Stuffing: Why Businesses Must Act in 2022

The New York Attorney General Letitia James kicked off the year with a wake-up call for local businesses. Her office contacted 17 well-known brands to inform them that over a million customers had been compromised by credential stuffing attacks. Most were unaware they’d even been hit.

OpenVPN Team

5 minute read
The Biggest Cyber Threat to Business: How Ransomware Might Evolve in 2022

The Biggest Cyber Threat to Business: How Ransomware Might Evolve in 2022

Ransomware broke new records in 2021, as cyber-criminals continued to exploit corporate security gaps and new trends associated with pandemic-era working. One estimate claims the volume of global attacks reached 470 million by Q3, a 148% increase on the same period in 2020. If IT and security leaders thought the worst may be over, they’ll need to

OpenVPN Team

6 minute read
What Are Credential Stuffing Attacks?

What Are Credential Stuffing Attacks?

Credential stuffing attacks are growing in popularity — with hackers, anyway; not the businesses targeted. In late December, Help Net Security reported there were more than two billion credential stuffing attacks in the previous 12 months, a 98 percent year-over-year increase. The infosec site predicted attacks would peak during the holiday

OpenVPN Team

6 minute read
What is Killware? What You Need to Know About the Newest Cybersecurity Threat

What is Killware? What You Need to Know About the Newest Cybersecurity Threat

Killware has been frequenting the news in recent weeks. Some of the actual headlines, from real news sources, can come across as pretty frightening:

OpenVPN Team

8 minute read
VPN Audits — A Primer and a Security Audit Checklist

VPN Audits — A Primer and a Security Audit Checklist

Popularity of VPNs (virtual private networks) has grown with the popularity, and necessity, of remote workers using outside-the-firewall remote access, often on public WiFi, to tap into internal networks. Like anyone selling a product or service, VPN service providers make bold claims and promises. But should you trust them? How can you identify

OpenVPN Team

5 minute read
VPN Hardening: What It Is and How to Do It

VPN Hardening: What It Is and How to Do It

Cybersecurity is inherently complex. It involves hardware and software, as well as the most complicated component — actual human beings. Sometimes, though, the simplest measures can make a significant difference.

OpenVPN Team

5 minute read
IoT Vulnerabilities for Cybersecurity

IoT Vulnerabilities for Cybersecurity

The term “Internet of Things” (IoT) was first used in 1985. These “things” are tools, programmed for applications, and they transmit data over the internet or other networks. IoT devices include hardware such as sensors, actuators, gadgets, appliances, or machines that can be embedded into mobile devices, industrial equipment, environmental

OpenVPN Team

8 minute read
OpenVPN 2021 Year in Review

OpenVPN 2021 Year in Review

Edit: OpenVPN Cloud is now CloudConnexa® — learn more here. It’s hard to believe, but 2022 is right around the corner. We had another incredible year of growth at OpenVPN, rolling out new cybersecurity features for OpenVPN Cloud and Access Server. Things happen so fast it’s easy to lose track of them, so we wanted to take this opportunity to look

OpenVPN Team

7 minute read
Top Cybersecurity Threats for Business in 2021

Top Cybersecurity Threats for Business in 2021

Love them or loathe them, year-end lists are an obligatory part of the final weeks of any year, and 2021 is no different. Now, OpenVPN isn’t qualified to report on the best books, albums, movies, or television shows of the year. Anything about the best and/or worst dressed? Not our area of expertise. But we are uniquely qualified to break down the

OpenVPN Team

7 minute read
OpenVPN Commercial Solutions Not Affected by the Log4Shell (aka, Log4j) Exploit

OpenVPN Commercial Solutions Not Affected by the Log4Shell (aka, Log4j) Exploit

Edit: OpenVPN Cloud is now CloudConnexa® — learn more here. In the last few days there were a number of alarming headlines about the Log4J Shell exploit. Those headlines, understandably, caused considerable concern for security teams around the world, including here at OpenVPN.

OpenVPN Team

2 minute read