Yotam Gutman
16.3.2026
Six years after the shift to remote work, the traditional corporate security perimeter has dissolved. Explore how legacy remote access tools like VPNs have become prime targets for attackers
Six years ago, the COVID-19 pandemic forced a global experiment in remote work at an unprecedented scale. Overnight, millions of employees abandoned office cubicles for kitchen tables. At the time, it was a desperate emergency measure. Today, it’s a permanent cornerstone of the modern workplace.
Hybrid and remote models have fundamentally reshaped how organizations operate, recruit talent, and measure productivity. But this shift didn't just change where we work; it permanently and irrevocably altered the cybersecurity landscape.
The rapid migration from protected office networks to chaotic home environments effectively dissolved the traditional corporate security perimeter. What began as a temporary workaround became a massive, permanent new attack surface.
Before 2020, corporate cybersecurity strategies were largely built around a clear, defensible boundary: employees worked inside protected office networks, on managed devices, securely tucked behind robust firewalls. "Inside" was trusted; "outside" was hostile.
When lockdowns began, that model collapsed. Organizations rushed to enable remote access by scaling up traditional technologies like VPNs, remote desktop solutions, and cloud services. Overnight, the "perimeter" expanded to include millions of living rooms, coffee shops, and unmonitored home Wi-Fi networks. The result was a dramatically expanded and undefended attack surface. For many companies, the most significant risk wasn’t a sophisticated external hacker- it was the lethal combination of human error, personal devices and remote access directly into core organizational systems.
This new paradigm fundamentally relies on remote access technologies. Overnight, systems like VPNs, cloud collaboration platforms, and identity managers became the critical gateways through which entire workforces accessed sensitive corporate data. This sudden and extreme reliance on remote access infrastructure introduced severe, systemic vulnerabilities. Attackers quickly recognized these tools not just as new opportunities, but as high-value, high-reward targets that could yield unparalleled access. Credential theft, sophisticated phishing campaigns specifically designed to harvest VPN logins, and exploits targeting critical zero-day vulnerabilities in remote access systems surged during and after the pandemic.
This isn't just theory; it's a direct link to the reality where 63% of businesses have experienced data breaches directly linked to their remote work environments. The threat is now endemic to the remote access model itself.
Since then, the value of a single remote access credential has skyrocketed. Attackers no longer need to breach a complex corporate firewall; they simply need to compromise a single employee’s login to gain a 'trusted' entry point. Research has shown a dramatic increase in listings for corporate network credentials on the dark web, with access to some critical systems selling for tens of thousands of dollars.
Since remote access provides such a convenient method for hackers to enter the organization, and later, to exfiltrate data, hackers have shifted their attention from directly hacking the organization to obtaining and abusing remote access tools.
Phishing campaigns became laser-focused, with attackers creating near-perfect replicas of corporate VPN login portals to trick unsuspecting employees. These campaigns often coincide with known security advisories, preying on employee urgency to 'update' their credentials.
Perhaps most alarming is the rise in exploits targeting previously unknown vulnerabilities in the very systems designed to provide security: VPNs and remote access gateways. Attackers are aggressively seeking out and deploying zero-day exploits in products from market leaders.
Notable recent incidents paint a chilling picture of how compromise can scale from a single remote access system to an entire organization: Ivanti Connect Secure and Policy Secure Zero-Day Exploits (2024): In early 2024, state-sponsored cyberespionage groups were discovered exploiting two critical zero-day vulnerabilities (CVE-2023-46805 and CVE-2024-21887) in widespread Ivanti VPN devices. These vulnerabilities allowed attackers to bypass authentication and execute remote code, granting them full control over the affected systems and, consequently, unrestricted access to the connected corporate networks. The speed with which these exploits were deployed underscores the critical risk posed by any weakness in the remote access stack.
These incidents are not aberrations; they are a direct consequence of an architecture that relies on inherently vulnerable gateways. The 55% of cybersecurity professionals who report that remote work slows down incident response find themselves in a race against time, fighting to contain breaches that begin when the very infrastructure of trust becomes a weapon of mass compromise.
Six years later, the organizations that have successfully adapted are the ones that accepted a new reality: the perimeter is dead, and it's never coming back.
Continuing to rely on technologies designed for the old "trusted network" model is a recipe for disaster. The modern enterprise operates in a world where:
This requires a fundamental shift in security strategy, moving toward modern, remote access solutions. We must assume that no user, device, or network can be trusted by default even if they appear to have the right credentials.
Empower global teams with secure, hardware-enforced remote access, no VPNs, no data exposure, no risk.