Remote Desktop Protocol: The Series
What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it to ground it when it goes wrong? An Active Adversary Special Report
What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it to ground it when it goes wrong? An Active Adversary Special Report
Is it really that risky to expose an RDP port to the internet? What if you change the default port? What if it’s just for a little while? The data answers, loud and clear
How can defenders begin to make sense of RDP issues on their networks? We present three powerful tools for investigators’ toolkits
Where in the world is your attacker? Presenting a less-known but useful event to look for in your logs
Keeping an eye on who’s trying to get onto your network – whether or not they’re successful – can pay off on multiple fronts
On the hunt for successful RDP connections that have entered your network from outside? A step-by-step guide (and a query to get you started)
Insight into ESET telemetry statistics about AceCryptor in H2 2023 with a focus on Rescoms campaigns in European countries
4909 Murphy Canyon Road Suite, 500
San Diego, CA 92123
Store
Company
Support
Newsletter
Technology Solutions You Can Trust Dismiss