3. VPN abuse for Endpoint Protection Evasion