Security News > 2020 > May > How to combat cyberattacks that exploit Microsoft's Remote Desktop Protocol
In many cases, IT staff and other employees need to remotely connect to workstations and servers at the office, and for that they typically rely on the Microsoft Remote Desktop Protocol built into Windows.
In a blog post published on Thursday, McAfee explains how cybercriminals are taking advantage of RDP access and what organizations can do to protect themselves.
In its blog post "Cybercriminals Actively Exploiting RDP to Target Remote Organizations," McAfee explained that RDP often runs on Windows servers, including web servers and file servers.
In January, Microsoft also had to fix flaws related to the Remote Desktop Gateway, which is used to secure remote connections.
Criminals who gain remote access to an organization through RDP can use it for a variety of nefarious purposes.
News URL
Related news
- Microsoft fixes Remote Desktop issues caused by Windows Server update (source)
- Microsoft SharePoint RCE flaw exploits in the wild – you've had 3 months to patch (source)
- Microsoft warns Azure Virtual Desktop users of black screen issues (source)
- VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware (source)
- HTTP your way into Citrix's Virtual Apps and Desktops with fresh exploit code (source)