Remote desktop brute force tool12/31/2022 ![]() ![]() It’s long been a known fact that a material percentage of ransomware attacks (regardless of the variant involved) bounce between phishing- and remote desktop-based attacks as their initial attack vector. ![]() So, I want to take the opportunity to look at some recent news and analysis of ransomware attacks in order to make some recommendations that will make the remote access solution you use today less of an asset to the cybercriminal. This kind of detail can be used to prioritize what needs to change about the environment to a) make it more secure and b) make it less prone to cyberattacks. It also provides an understanding of how specific tools – such as remote access solutions (both those organization-sanctioned or threat actor-utilized) – are used time and time again. One of the benefits of more news stories detailing attack specifics, as well as security vendors putting out analyses of attacks they’ve encountered, is the incredible sharing of details that provide those that are paying attention with great insight into exactly what actions are being taken and malicious methods are being used by cybercriminals. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
May 2023
Categories |