{"id":11713,"date":"2024-05-16T10:49:56","date_gmt":"2024-05-15T22:49:56","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=11713"},"modified":"2024-05-16T10:49:56","modified_gmt":"2024-05-15T22:49:56","slug":"can-vpns-be-defeated","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=11713","title":{"rendered":"Can VPNs be defeated?"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; column_structure=&#8221;3_5,2_5&#8243; title_text=&#8221;VPNHacks&#8221; background_image=&#8221;\/wp-content\/uploads\/2024\/05\/VPNHacks.jpeg&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; type=&#8221;3_5&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; background_color=&#8221;rgba(34,34,34,0.85)&#8221; text_text_color=&#8221;#FFFFFF&#8221; header_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;|||20px|false|false&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221;]<p><span style=\"color: #ffffff;\"><strong>We\u2019re reading about a flaw called \u2018TunnelVision\u2019 that could give hackers access to overcome virtually any VPN security solutions.<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">It works by manipulating routing in DHCP, which is the mechanism networks use to hand out IP addresses to devices.\u00a0 DHCP has been around for decades and predates the recent surge of cyber activity.<\/span><\/p>\n<h2><span style=\"color: #ffffff;\"><strong>The recommendations are to keep your VPN software up-to-date.<\/strong><\/span><\/h2>\n<p><span style=\"color: #ffffff;\">Refer <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3661\" style=\"color: #ffffff;\">NVD &#8211; CVE-2024-3661 (nist.gov)<\/a><\/span><\/p>\n<p><span style=\"color: #ffffff;\">As always, Cybersecurity solutions rely on layers upon layers, so if one layer is defeated, you still have protections in place, and each layer makes any vulnerabilities harder for a hacker to exploit.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">At the same time, it is concerning to note that the NIST Vulnerability Database is having a hard time keeping up with new flaws. <a href=\"https:\/\/nvd.nist.gov\/general\/news\/nvd-program-transition-announcement\" style=\"color: #ffffff;\">NVD Program Announcement &#8211; Updated (nist.gov)<\/a><\/span><\/p>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.24.3&#8243; _module_preset=&#8221;default&#8221; type=&#8221;2_5&#8243; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re reading about a flaw called \u2018TunnelVision\u2019 that could give hackers access to overcome virtually any VPN security solutions. It works by manipulating routing in DHCP, which is the mechanism networks use to hand out IP addresses to devices.\u00a0 DHCP has been around for decades and predates the recent surge of cyber activity. The recommendations [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11716,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-11713","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/11713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11713"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/11713\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}