“How Attackers Can Take Advantage of Encrypted Tunnels”

As indicated by a survey conducted by Venafi, many organizations often neglect to examine encrypted traffic within their networks. As the encryption of traffic by organizations as well as the use of machine identities increases, the risk of cyberattacks grows. Security experts at Venafi have highlighted ways in which the exploitation of encrypted tunnels could be used to attack organizations. This article further discusses the importance of actively securing encrypted tunnels and five ways in which encrypted tunnels could be used against organizations.

Help Net Security reports “How Attackers Can Take Advantage of Encrypted Tunnels”

Submitted by Anonymous on