Tag: tunneling protocols

Cybersecurity Threat Advisory: Critical vulnerabilities in VPNs and routers
Cybersecurity Threat Advisory: Critical vulnerabilities in VPNs and routers
Critical vulnerabilities have been discovered in multiple tunneling protocols, potentially exposing approximately 4.2 million hosts. These include a wide range of devices such as Virtual Private Networks (VPNs), Internet Service Provider (ISP) home routers, core internet routers, mobile network gateways,...