The COVID-19 pandemic has seen a surge in the adoption of remote access solutions such as virtual private networks (VPNs), remote storage and cloud-based technologies in remote office scenarios. However, these solutions have also exposed a new attack surface to the Internet. In the past year, critical vulnerabilities were frequently discovered in different remote access products. Some of them had been exploited in the wild to launch various attacks, e.g. malware infection, ransomware, information leakage, etc. In addition, as some enterprises continue to use older versions of remote access products for stability reasons, this may increase the risks of vulnerabilities in older versions being exploited for cyber attacks.
For details, please visit the below link: