Browsing tag

Remote Desktop Protocol (RDP)

Simple reasons why the Microsoft Azure cloud isn’t secure

Recent research by ethical hacking specialists from Check Point Research revealed the existence of dozens of vulnerabilities in a commonly used protocol in Microsoft Azure. These flaws expose multiple cyberattacks to Microsoft cloud users. During their presentation at the Black Hat cybersecurity conference, experts noted that Remote Desktop Protocol (RDP) flaws, used to access other […]

New vulnerability in Windows RDP; BlueKeep patch is not working

Web application security test specialists published a report detailing a new uncorrected vulnerability in the Microsoft Windows Remote Desktop Protocol (RDP). Tracked as CVE-2019-9510, this vulnerability could allow client-side attackers to bypass the lock screen in remote desktop sessions. The flaw was discovered by the Carnegie Mellon University researcher Joe Tammariello; in his report, the […]

Hackers are using ‘network tunneling’ to bypass the firewall instead of RDP

Network tunneling technique is being increasingly used for attackers using RDP The Remote Desktop Protocol (RDP) is a Windows component designed to provide administrators and users with a remote access path to their systems. According to network security and ethical hacking from the International Institute of Cyber Security report that malicious hackers have been abusing […]

Services to attack businesses can be acquired from $40 USD in dark web

Low costs for these services are a big surprise for experts Information attacks continue to increase. According to reports of experts in enterprise data protection services from the International Institute of Cyber Security, these incidents have increased by 32% between the first quarter of 2017 and the first quarter of 2018. The frequency of these attacks is […]

New Code-injecting SOREBRECT Fileless Ransomware detected in the wild

The number of fileless malware continues to increase, recently security researchers spotted a new Fileless Ransomware dubbed Sorebrect. Sorebrect is able to inject malicious code into a legitimate system process (svchost.exe) on a targeted system and it terminates its binary to evade detection. It also make hard forensics analysis by deleting the affected system’s event logs using […]