Live Breaking News & Updates on பெருநிறுவன சாதனங்கள்

Remote Attackers Can Now Reach Protected Network Devices via NAT Slipstreaming


minute read
Share this article:
A new version of NAT slipstreaming allows cybercriminals an easy path to devices that aren’t connected to the internet.
Disconnecting devices from the internet is no longer a solid plan for protecting them from remote attackers. A new version of a known network-address translation (NAT) slipstreaming attack has been uncovered, which would allow remote attackers to reach multiple internal network devices, even if those devices don’t have access to the internet.
According to researchers from Armis and Samy Kamkar, chief security officer and co-founder at Openpath Security, attackers can execute an attack by simply convincing one target with internet access on the network to click on a malicious link. From there, cybercriminals can gain access to other, non-exposed endpoints, including unmanaged devices like industrial controllers, with no further social engineering needed.

Samy-kamkar , Openpath-security , Application-level-gateway , Corporate-devices , விண்ணப்பம்-நிலை-நுழைவாயில் , பெருநிறுவன-சாதனங்கள் ,