Browsing tag

remote desktop

Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware

Security vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors to deploy the PlugX malware. AhnLab Security Emergency Response Center (ASEC), in a new analysis, said it marks the continued abuse of the flaws to deliver a variety of payloads on compromised systems. This includes the Sliver post-exploitation […]

New “Prestige” Ransomware Uses Remote Execution Utilities to Launch Destructive Attacks

Microsoft Threat Intelligence Center (MSTIC) found a new ransomware named “Prestige” ransomware targeting organizations in the transportation and associated logistics industries in Ukraine and Poland. Researchers say this novel ransomware campaign was first deployed on October 11 in attacks occurring within an hour of each other across all victims. Important Features of Prestige Ransomware In […]

5 Best TeamViewer Alternatives For 2019: Mirror Your PC Anywhere

If you’re one of those who has to keep working on your vacation then you might know the pain of carrying a laptop and accessories all the time. What if you don’t need to bear that extra luggage, maybe you can work on your iPad or Android tablet? But at the same time, you don’t […]

BlueKeep Bug: Even NSA Wants You To Install Windows Updates

The BlueKeep RDP bug (CVE-2019-0708) in Microsoft Windows is a serious issue and it has been making rounds for almost a month now. As you might know, it affects older Windows versions including Windows 7 and XP. Microsoft first revealed details about the bug last month and also released a security patch for all the […]

Steps to Remotely Access Your Laptop from Mobile

A Remote access can help you in a lot more ways to reduce your time frame. In this super speedy workaholic world of today, you never know which file your boss might ask out for at any moment of the day! If you have that with you, that’s great but what if you have it […]

LockCrypt, a ransomware that arrives through Remote Desktop

As we all know, the techniques used by hackers to carry out their activities are very varied; now they look for flaws in the configuration of services and common applications, such as the remote desktop services of the systems, to be able to connect to them easily and have absolute control over the system, like […]