In our third blog about migrating to a zero trust architecture, we consider the security properties of an Always On VPN, and the factors to consider when deciding if you no longer need one. NCSC Feed
CE Phoenix 1.0.8.20 Remote Code Execution
CE Phoenix version 1.0.8.20 remote code execution exploit written in Python. Exploit Files ≈ Packet Storm