Hackers Conducting RDP Attacks Using New Technique to Bypass Protections

source : gbhackers

A Microsoft Windows component, RDP was designed to provide administrators, engineers, and users with remote access to systems. However, threat actors have been using the technology for nefarious purposes, and the trend continues, especially since an RDP attack is usually more difficult to detect than a backdoor.  Continue reading “Hackers Conducting RDP Attacks Using New Technique to Bypass Protections”

How hackers can exploit devices used at home

How hackers can exploit devices used at home

As Americans increasingly fill their homes with smart technology, the risk of hackers exploiting their devices is growing.

Experts say the expanding ecosystem of internet-connected devices such as smart thermostats, home security systems and electric door locks are increasingly susceptible to hackers, including those trying to leverage voice-command devices.

Source: thehill Continue reading “How hackers can exploit devices used at home”

20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services

20 Critical Security Controls: Control 9 - Limitation and Control of Network Ports, Protocols, and ServicesKey Takeaways for Control 9
Reduce your attack surface. So much of control 9 is about limiting the external attack surface of a system. This is always the first step in securing an endpoint.
Duplication with other controls. Everything being done in control 9 is going to be accomplished by completing other controls elsewhere. I would probably leave this one for last as it’s the least impactful (due to duplication) out of any of the controls.

Source: tripwire

Continue reading “20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services”

Blog at WordPress.com.

Up ↑