Zeroport blog
14-01-2026
There comes a special moment in every startup life- the moment it emerges from stealth. Today- it’s Zeroport’s turn.
Yotam Gurtman
29-12-2025
Remote work has amplified insider threats by extending VPN-based access beyond the perimeter. When credentials become the only gate, disgruntled or compromised insiders can exfiltrate data at scale—turning trusted access into a breach path.
Yotam Gutman
24-12-2025
Remote hiring has become a security boundary. North Korean IT workers exploit stolen identities, VPNs, and laptop farms to gain trusted access, steal data, and extort companies—turning VPN-based remote work into a scalable attack surface.
20-12-2025
VPNs are no longer breached only through vulnerabilities, but through stolen credentials sold and reused at scale. Once attackers log in, they blend in, move laterally, deploy ransomware, and exfiltrate data.
16-12-2025
Water utilities are increasingly targeted through insecure remote access. Real-world attacks reveal how VPNs and remote tools expose OT systems, highlighting the need for hardware-enforced, non-IP protection.
25-11-2025
In 2025, VPNs became prime attack targets. While adoption surged, attackers shifted from exploiting VPN vulnerabilities to abusing stolen credentials at scale,turning remote access into a high-impact entry point for ransomware.
Empower global teams with secure, hardware-enforced remote access, no VPNs, no data exposure, no risk.