• Latest
  • Trending
Zscaler Report: VPN Risks Accelerate Move to Zero Trust

Zscaler Report: VPN Risks Accelerate Move to Zero Trust

14 April 2025
Trump launches crypto venture to fuel 2024 Presidential run

Indian state-owned oil firms cut Russian crude orders

1 August 2025
Boeing reports $22.7 billion in Q2 revenue amid ongoing recovery efforts

Boeing reports $22.7 billion in Q2 revenue amid ongoing recovery efforts

1 August 2025
PwC’s latest M&A technology platform reimagines the way clients do deals

PwC’s latest M&A technology platform reimagines the way clients do deals

1 August 2025
Turn your idea into an App without tech skills

Turn your idea into an App without tech skills

1 August 2025
LTIMindtree and Adobe launch CraftStudio to power smarter marketing

LTIMindtree and Adobe launch CraftStudio to power smarter marketing

31 July 2025
Top 10 Python skills every developer should learn

The building blocks of Python Syntax explained

31 July 2025
Cognizant beats Q2 guidance, announces $2 billion shareholder return plan

Cognizant beats Q2 guidance, announces $2 billion shareholder return plan

31 July 2025
Retailers are not buying Trump’s ‘Eat the Tariffs’ advice

How Trump’s tariffs could impact India’s major industries?

31 July 2025
Paradip Port Authority hits milestone: Handles 41.12 MMT cargo

Data Story: Iron ore vessel numbers remain tepid at Paradip Port

30 July 2025
Why business users are choosing Python over Excel

Why business users are choosing Python over Excel

30 July 2025
Apple to open US Manufacturing Academy in Detroit on August 19 | Company News

Apple to open US Manufacturing Academy in Detroit on August 19 | Company News

30 July 2025
Palo Alto Networks in talks to acquire CyberArk for over $20 billion

Palo Alto Networks in talks to acquire CyberArk for over $20 billion

30 July 2025
Friday, August 1, 2025
  • Login
Data Biz Times
  • Data Story
  • Artificial Intelligence
  • Media Release
  • Technology
  • Business
  • Contact Us
No Result
View All Result
  • Data Story
  • Artificial Intelligence
  • Media Release
  • Technology
  • Business
  • Contact Us
No Result
View All Result
Data Biz Times
No Result
View All Result

Zscaler Report: VPN Risks Accelerate Move to Zero Trust

in Media Release
Reading Time: 5 mins read
0
Zscaler Report: VPN Risks Accelerate Move to Zero Trust

DBT Bureau

Pune, 14 April 2025

RelatedPosts

LTIMindtree and Adobe launch CraftStudio to power smarter marketing

Apple to open US Manufacturing Academy in Detroit on August 19 | Company News

Avolon orders 90 Airbus aircraft to meet soaring global aviation demand

Zscaler, Inc. published the Zscaler ThreatLabz 2025 VPN Risk Report, commissioned by Cybersecurity Insiders, which highlights the widespread security, user experience and operational challenges posed by VPN services. The findings are based on insights from a survey of 600+ IT and security professionals. The results are stark: maintaining security and compliance is the single largest challenge (56%) facing enterprises using VPNs today. Meanwhile, the risks of supply chain attacks and ransomware are top of mind for these companies with 92% of respondents concerned that persistent VPN vulnerabilities will lead to ransomware attacks. These combined risks have culminated in a profound shift in thinking around enterprise VPNs with 65% of organizations planning to replace their VPNs within the year — while 81% plan to implement a zero trust everywhere strategy.

Initially built for remote access, VPNs have become a liability for corporate networks, exposing IT assets and sensitive data due to over-privileged access, vulnerabilities, and an ever-growing attack surface. VPN, both physical and virtual, is opposite of Zero Trust as by architecture it brings the remote users as well as attackers on the network. Additionally, VPNs hinder operational efficiency with slow performance, frequent connection issues, and complex maintenance, burdening IT teams and disrupting employee productivity. The report aims to shed light on these concerns with trusted insights from industry peers, while arming enterprises with guidance to enable secure access across today’s hybrid work environments.

Security and usability concerns
Security and compliance risks ranked as the top VPN challenges at 54%, highlighting growing concerns that VPNs are inadequate and obsolete for defending against today’s evolving cyber threats. Cybercriminals are now leveraging AI to pinpoint vulnerabilities by using GPT models to run queries focused on identifying weaknesses in VPNs — for instance, performing reconnaissance by simply asking a generative AI chatbot to return all current CVEs for VPN products in use by an enterprise. Tasks that once required weeks or even months can now be accomplished in just minutes.

Recently, a foreign cyberespionage group exploited vulnerabilities in a popular VPN, gaining unauthorized access to corporate networks. This incident, one of several in recent months, reinforces how VPN vulnerabilities continue to be a key target in cyberattacks, underscoring the urgent need to transition from legacy security models to a Zero Trust architecture. A staggering 92% of survey respondents said they are concerned about being targeted by ransomware attacks due to unpatched VPN vulnerabilities.

“Attackers will increasingly leverage AI for automated reconnaissance, intelligent password spraying, and rapid exploit development, allowing them to compromise VPNs at scale,” said Deepen Desai, CSO at Zscaler. “To address these risks, organizations should shift to a Zero Trust everywhere approach. This approach eliminates the need for internet-exposed assets like VPNs (physical and virtual), while drastically reducing the attack surface and potential impact of breaches. It’s encouraging to see that 81% of organizations are planning to implement Zero Trust within the next year—a critical step in mitigating the security risks posed by legacy technologies like VPNs.”

The rise of critical, scannable VPN vulnerabilities
To understand how attackers exploit vulnerabilities in internet-connected VPN infrastructure, ThreatLabz also analyzed VPN Common Vulnerabilities and Exposures (CVEs) from 2020-2025, based on data from the MITRE CVE Program. In general, vulnerability reporting is a good thing, as rapid vulnerability disclosure and patching helps the entire ecosystem improve cyber hygiene, foster community collaboration, and quickly respond to new vectors of attack. No type of software is immune from vulnerabilities, nor should it be expected to be.

Over the sample period, VPN CVEs grew by 82.5% (note that early 2025 data has been removed for this portion of the analysis). In the past year, roughly 60% of the vulnerabilities indicated a high or critical CVSS score — indicating a potentially serious risk to impacted organizations. Moreover, ThreatLabz found that vulnerabilities enabling remote code execution (RCE) were the most prevalent kind, in terms of the impact or capabilities they can grant to attackers. These types of vulnerabilities are typically serious, as they can grant attackers the ability to execute arbitrary code on the system. Put another way, far from being innocuous, the bulk of VPN CVEs are leaving their customers vulnerable to critical exploits that attackers can, and often do, exploit. 

Unwelcome party guests
VPNs provide broad access following authentication, extending user access to contractors, external partners and vendors. While great in theory connectivity tools, attackers can easily exploit weak or stolen credentials, misconfigurations, and unpatched vulnerabilities to compromise these trusted connections. The report shows, 93% of organizations now worry about backdoor vulnerabilities stemming from third-party access. In February 2024, a financial services company suffered a data breach exposing nearly 20,000 clients’ personal information, caused by vulnerabilities in their VPN. This incident highlights how VPNs create exploitable entry points into corporate networks. 

Out with the old, in with the new – Zero Trust Everywhere
Legacy or traditional vendors are attempting to adapt to the evolving landscape by deploying virtual machines in the cloud and labeling them as Zero Trust solutions. Unfortunately, a VPN hosted in the cloud remains, at its core, a VPN and does not adhere to true Zero Trust principles. Illustrating this point, the industry has recently witnessed massive spikes in scanning activity targeting tens of thousands of publicly searchable VPN IP addresses hosted by at least one of the largest security vendors. Historically, this kind of activity has indicated some likelihood that attackers may be preparing to exploit yet-to-be-disclosed vulnerabilities in targeted VPN assets. Case in point: if you are reachable, you are breachable — which is why, from an architectural perspective, cloud-based VPN technology can never achieve true zero trust principles, no matter the branding.

The switch to a holistic Zero Trust architecture is rapidly gaining momentum and replacing outdated legacy security tools due to the proven security benefits and efficiency gains for adopting organizations. The report found 81% of organizations are adopting, or planning to adopt, a Zero Trust architecture within the next year and by extending this architecture to users, applications and workloads, enterprises are ensuring that Zero Trust is truly everywhere enabling VPN-free resilient security that:

  1. Minimizes the Attack Surface: Replaces network-based access with Zero Trust policies and identity-based controls to secure users and third parties.
  2. Blocks Threats: Prevents initial compromise through robust authentication, identity security, and least-privileged Zero Trust Access.
  3. Prevents Lateral Movement: Uses Zero Trust segmentation to contain threats and stop unauthorized spread within networks.
  4. Enhances Data Security: Enforces context-aware, integrated Zero Trust policies to protect sensitive information.
  5. Simplifies Operations: Replaces VPNs with AI-driven security, continuous monitoring, and automated policy enforcement, in addition to uninterrupted access with business continuity.

By adopting these best practices, organizations can replace VPN security risks with a robust Zero Trust framework, enabling continuous verification, least-privileged access, and proactive threat prevention.

Related Posts

LTIMindtree and Adobe launch CraftStudio to power smarter marketing

LTIMindtree and Adobe launch CraftStudio to power smarter marketing

by databiztimes.com
31 July 2025
0

DBT Bureau Pune, 31 July 2025 LTIMindtree has reported the launch of BlueVerse CraftStudio, a next-generation agency that harnesses Adobe’s...

Apple to open US Manufacturing Academy in Detroit on August 19 | Company News

Apple to open US Manufacturing Academy in Detroit on August 19 | Company News

by databiztimes.com
30 July 2025
0

DBT Bureau Pune, 30 July 2025 Apple will open its all-new Apple Manufacturing Academy in Detroit on Tuesday, August 19,...

Avolon orders 90 Airbus aircraft to meet soaring global aviation demand

Avolon orders 90 Airbus aircraft to meet soaring global aviation demand

by databiztimes.com
28 July 2025
0

DBT Bureau Pune, 28 July 2025 Avolon, a leading global aviation finance company, has placed an order for 90 Airbus...

Sonata Software partners with Wharton to advance research in agentic AI | Company News

Sonata Software partners with Wharton to advance research in agentic AI | Company News

by databiztimes.com
27 July 2025
0

DBT Bureau Pune, 27 July 2025 Sonata Software announced its partnership with the Wharton AI & Analytics Initiative (WAIAI) at...

Trump launches crypto venture to fuel 2024 Presidential run
world

Indian state-owned oil firms cut Russian crude orders

by databiztimes.com
1 August 2025
0

Athira Sethu Kochi, 1 August 2025 India is the world's third-largest oil importer. It also purchases more Russian oil transported...

Read moreDetails
Boeing reports $22.7 billion in Q2 revenue amid ongoing recovery efforts
Business

Boeing reports $22.7 billion in Q2 revenue amid ongoing recovery efforts

by databiztimes.com
1 August 2025
0

DBT Bureau Pune, 1 August 2025 The Boeing Company posted second-quarter 2025 revenue of $22.7 billion, with a GAAP loss...

Read moreDetails
PwC’s latest M&A technology platform reimagines the way clients do deals
Technology

PwC’s latest M&A technology platform reimagines the way clients do deals

by databiztimes.com
1 August 2025
0

DBT Bureau Pune, 1 August 2025 PwC and its alliance partner, Harvey, have extended access to their latest co-developed technology,...

Read moreDetails
Turn your idea into an App without tech skills
Blog

Turn your idea into an App without tech skills

by databiztimes.com
1 August 2025
0

Athira Sethu Kochi, 1 August 2025 No-code development is a simple and new means of creating apps, websites, and software,...

Read moreDetails
DBT Bureau

Data Biz Times © 2024. All Rights Reserved.

Navigate Site

  • Media Release
  • Blog
  • Contact Us
  • Privacy Policy

Follow Us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Media Release
  • Data Story
  • Business
  • Tech
  • Artificial Intelligence

Data Biz Times © 2024. All Rights Reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?