11/15/2022 0 Comments Remote desktop brute force tool![]() Accounts with RDP privileges may have a weak password or no additional layers of security. ![]() Though Remote Desktop Protocol can be enough of a security risk on its own, organizations often compound the vulnerabilities by failing to properly secure RDP accounts and services. SEE: How to work from home: IT pro’s guidebook to telecommuting and remote work (TechRepublic Premium) A report published on Monday by ESET discusses how attackers take advantage of RDP and what organizations can do to combat them. ![]() Of course, cybercriminals have pounced on this transition, which is why RDP is more exploitable than ever. But many of those employees still need to remotely access computers in the office, which has triggered an increase in the use of programs that rely on Microsoft’s Remote Desktop Protocol (RDP). The coronavirus lockdown has prompted a host of organizations to require their staffers to work from home. How to protect your remote desktop environment from brute force attacksĪn RDP compromise provides a cybercriminal with a backdoor for ransomware and other types of malware, says security provider ESET. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |