Security Advisory
Connected Device Security Report in the Time of COVID-19
How attackers can exploit RDP misconfigurations, and what you can do about it
- Learn about the risks associated with RDP & how attackers can exploit the protocol
- Read real-world examples of suspicious RDP activity detected by ExtraHop Reveal(x)
- Find out how to use network detection and response to mitigate RDP-based attacks