Remote Desktop Protocol: The Series
What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it…
What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it…
Is it really that risky to expose an RDP port to the internet? What if you change the default port?…
How can defenders begin to make sense of RDP issues on their networks? We present three powerful tools for investigators’…
Where in the world is your attacker? Presenting a less-known but useful event to look for in your logs
Keeping an eye on who’s trying to get onto your network – whether or not they’re successful – can pay…
On the hunt for successful RDP connections that have entered your network from outside? A step-by-step guide (and a query…
Multiple threat actors are exploiting the recently disclosed JetBrains TeamCity flaw CVE-2024-27198 in attacks in the wild. Trend Micro researchers…
The nefarious cyber-espionage North Korean Kimsuky APT group has been in the limelight in the cyber threatscape since at least…
In the UK, cyber security has been dropping down the board’s list of priorities. A 2022 Proofpoint study found that…
The Companies and Intellectual Property Commission (CIPC) in South Africa recently fell victim to a significant cyberattack, triggering concerns about…