• Latest
  • Trending
  • All
  • Industry
  • Compliance
  • Global Trade
  • Industry
  • Sustainability & Ethics
  • Video
  • Security & Risk
Millions-of-Internet-Hosts-Affected-by-Vulnerabilities-in-Tunneling-Protocols

Millions of Internet Hosts Affected by Vulnerabilities in Tunneling Protocols

02/16/2025
U.S. Tariff Threats Raise Concerns for Bangladesh’s Garment Industry

U.S. Tariff Threats Raise Concerns for Bangladesh’s Garment Industry

05/06/2025
Ford Expects $1.5bn Profit Impact Due to Trump Tariffs

Ford Expects $1.5bn Profit Impact Due to Trump Tariffs

05/06/2025
Mattel Accelerates Shift Away from China as Tariffs Impact Toy Industry

Mattel Accelerates Shift Away from China as Tariffs Impact Toy Industry

05/06/2025
U.S. Tariff Adjustments Influence Global Trade Dynamics

U.S. Tariff Adjustments Influence Global Trade Dynamics

05/05/2025
Trump Says He Will Call CEOs Over Business Decisions He Disagrees With

Trump Says He Will Call CEOs Over Business Decisions He Disagrees With

05/05/2025
Fed Maintains Caution Amid Tariff Uncertainty

Fed Maintains Caution Amid Tariff Uncertainty

05/05/2025
US Solar Tariffs Could Boost Southeast Asia’s Energy Shift

US Solar Tariffs Could Boost Southeast Asia’s Energy Shift

05/05/2025
Trump Proposes 100% Tariff on Foreign Films

Trump Proposes 100% Tariff on Foreign Films

05/05/2025
EU Reassesses Trade Strategy Amid US Tariff Threats and Chinese Overtures

EU Reassesses Trade Strategy Amid US Tariff Threats and Chinese Overtures

05/05/2025
Philippine officials report productive tariff talks with United States

Philippine officials report productive tariff talks with United States

05/05/2025
Australian Prime Minister Discusses Tariffs and AUKUS with Former President Trump After Re-Election

Australian Prime Minister Discusses Tariffs and AUKUS with Former President Trump After Re-Election

05/05/2025
Vietnam Maintains Growth Target Amid U.S. Tariff Challenges

Vietnam Maintains Growth Target Amid U.S. Tariff Challenges

05/05/2025
supplychainreport
Friday, May 9, 2025
  • Home
  • Industry
    • Supply Chain
    • Logistics & Transportation
    • Importing & Exporting
    • Manufacturing
    • Warehousing & Distribution
  • Compliance
    • Supply Chain Transparency
    • Anti-Money Laundering (AML)
    • Know Your Customer (KYC)
    • Risk Management
    • Export Controls
    • Sanctions
  • Global Trade
    • Market Trends
    • Economic Indicators
    • Sourcing
    • Trade Policies
    • International Relations
    • Trade Agreements
    • Tariffs & Duties
    • Import/Export Statistics
  • Luxury Goods
  • Industry
    • Blockchain in Supply Chain
    • Importing & Exporting
    • Automation & Robotics
    • Artificial Intelligence in Trade
    • Data & Analytics
  • Sustainability & Ethics
    • Green Supply Chains
    • Sustainable Logistics
    • Ethical Sourcing
    • Corporate Social Responsibility
    • Environmental Policies
  • Security & Risk
    • Cybersecurity in Trade
    • Fraud & Scams
    • Risk Mitigation
    • Security Protocols
    • Data Protection
  • ITC News
    • ITC Featured Members
    • ITC Business Councils Highlights
  • Events
    • Upcoming Conferences
    • Upcoming FREE Educational Webinars
No Result
View All Result
supplychainreport
No Result
View All Result

Millions of Internet Hosts Affected by Vulnerabilities in Tunneling Protocols

by Giezel Garcia
02/16/2025
in Cybersecurity in Trade, Security & Risk

Recent research has identified vulnerabilities in four tunneling protocols that have led to the hijacking of approximately 4.2 million internet hosts, including VPN servers, home routers, and enterprise network devices. The findings, published in a report by Top10VPN researchers on January 15, indicate that these security flaws could allow attackers to gain unauthorized access to both corporate and home networks.

According to the report, attackers can exploit these vulnerabilities to use compromised devices as one-way proxies, enabling a range of anonymous cyber activities. These activities include denial-of-service (DoS) attacks, DNS spoofing, TCP hijacking, SYN floods, and potential breaches of Wi-Fi networks. The most affected regions identified in the report include Brazil, China, France, Japan, and the United States.

YOU MAY ALSO LIKE

Social Media Videos Raise Questions on Luxury Goods Manufacturing, Prompt Denials and Investigations

Saviynt Unveils AI-Powered Identity Security Tool for Risk Management

Security experts warn that these vulnerabilities allow attackers to spoof source addresses and redirect network traffic through unsuspecting hosts, making malicious activities appear legitimate. Jason Soroko, a senior fellow at Sectigo, emphasized the risks posed by these vulnerabilities, highlighting concerns over unauthorized network access, stealthy DDoS attacks, and infiltration of Internet of Things (IoT) devices.

To mitigate these risks, Soroko recommended that organizations ensure tunneled traffic is only accepted from trusted endpoints. He also advised implementing proper source validation, applying security patches from vendors, and enforcing strict firewall rules. Strengthening tunneling configurations and verifying authentication checks can further reduce exposure to potential cyber threats.

Trey Ford, Chief Information Security Officer at Bugcrowd, noted that tunneling and amplification-based attacks have been a persistent issue in cybersecurity. He pointed out that similar techniques have been used in various forms for decades, including early SYN flood DoS attacks and more recent exploits involving DNS recursion and other network protocols.

Ford advised security teams to harden edge devices and limit exposure to external threats. He recommended restricting the scope of listening services and disabling unused network features to minimize the risk of unauthorized access.

As cybersecurity threats continue to evolve, experts stress the importance of proactive security measures and ongoing monitoring to safeguard networks against potential exploits.


Discover supply chain news insights on The Supply Chain Report. Enhance your international trade knowledge at ADAMftd.com with free tools.


#Cybersecurity #NetworkSecurity #TunnelingProtocols #InternetVulnerabilities #DataProtection #ITInfrastructure #ZeroDayExploit

ShareTweet

Subscribe Our Newsletter

Share Your News

Whether it’s a groundbreaking achievement, a heartwarming tale, or an insightful perspective, we want to hear it. Share your news with us, and let’s amplify your voice in the digital symphony of stories.

Submit

A man is riding a bike on a hill.

The Supply Chain Report is your essential daily news website, serving as a trusted source for comprehensive coverage of the complex and ever-evolving global supply chain dynamics. Our expert team delves into the intricacies of international trade, manufacturing, logistics, importing, exporting, and supply chain management; providing in-depth analysis and up-to-date news on the latest trends, disruptions, and technological advancements affecting industries worldwide. From detailed reports on international trade through to insights into procurement strategies and inventory management, we offer valuable content that helps professionals stay informed and make knowledgeable decisions in a fast-paced market.

Each day, we bring you cutting-edge news and expert commentary that dissect significant international trade and supply chain issues Our coverage spans a wide array of sectors including manufacturing, retail, healthcare, food, consumer goods, and technology, ensuring that no matter your field, you have the strategic information needed to navigate the challenges and opportunities of today’s supply chain landscape. By synthesizing complex data and presenting actionable insights, The Supply Chain Report empowers business leaders, policymakers, and logistics professionals to optimize their operations and drive forward with confidence in an interconnected world.

Connect With Us

  • About
  • Events
  • Privacy Policy
  • Contact Us

© 2024 International Centre for Trade Transparency Limited. Incorporated in the United Kingdom.

No Result
View All Result
  • Home
  • Industry
    • Supply Chain
    • Logistics & Transportation
    • Importing & Exporting
    • Manufacturing
    • Warehousing & Distribution
  • Compliance
    • Supply Chain Transparency
    • Anti-Money Laundering (AML)
    • Know Your Customer (KYC)
    • Risk Management
    • Export Controls
    • Sanctions
  • Global Trade
    • Market Trends
    • Economic Indicators
    • Sourcing
    • Trade Policies
    • International Relations
    • Trade Agreements
    • Tariffs & Duties
    • Import/Export Statistics
  • Luxury Goods
  • Industry
    • Blockchain in Supply Chain
    • Importing & Exporting
    • Automation & Robotics
    • Artificial Intelligence in Trade
    • Data & Analytics
  • Sustainability & Ethics
    • Green Supply Chains
    • Sustainable Logistics
    • Ethical Sourcing
    • Corporate Social Responsibility
    • Environmental Policies
  • Security & Risk
    • Cybersecurity in Trade
    • Fraud & Scams
    • Risk Mitigation
    • Security Protocols
    • Data Protection
  • ITC News
    • ITC Featured Members
    • ITC Business Councils Highlights
  • Events
    • Upcoming Conferences
    • Upcoming FREE Educational Webinars

© 2024 International Centre for Trade Transparency Limited. Incorporated in the United Kingdom.