Mitigating Zeppelin’s (and any other) Misuse of RDP for Remote Access
The latest advisory from the U.S. Government is a forewarning about how easy it is for cybercriminal gangs to leverage RDP for both initial access and to move laterally.
The latest advisory from the U.S. Government is a forewarning about how easy it is for cybercriminal gangs to leverage RDP for both initial access and to move laterally.
In the world of remote access, security threats are always lurking on the horizon. A recent article regarding the safety of VNC servers has once again highlighted that fact, reaffirming the importance of organizations having robust security in place.
Cyber Insurers are scrutinizing exactly what the state of your organization’s security stance looks like in order to obtain a policy – something remote access has quite a bit to say about.
With more ransomware attack analysis including specific details, it becomes clearer how ransomware gangs are leveraging your organization’s remote access against you.
Did you know that some of the questions we get asked the most are about passwords? Today’s blog discusses the different types of passwords associated with your VNC Connect account, how to change them, and some extra tips to help strengthen their security.
With third-party Remote Access solutions providing access to internal resources and elevated privileges, knowing the solution you employ is truly secure should be a critical part of your security strategy.
With great power comes great responsibility. Remote access can be a significant weapon in your organization’s arsenal of software tools. However, it can also cause security concerns when you don’t take all the necessary safety measures.
Many things come to mind when thinking of RealVNC. Secure remote access software is probably the first one. But… ducks? Infosecurity Europe 2022 was a huge success, and we have plenty to tell you.
I’ve covered in previous articles how remote access can be used by threat actors as a means of gaining entrance, persistence, stealth, and more as part of a cyberattack. And this potential misusing of remote access brings with it some hefty repercussions.
Remote Access to internal endpoints continues to be leveraged by threat actors involved in data breaches. But exactly how much a problem is it, and how can you put a stop to it?
RealVNC will be part of this year’s Infosecurity Europe event. The event has been connecting the information security community for 25 years and is taking place in five days, between June 21st and 23rd, at ExCel London.
RealVNC has recently engaged with Berlin-based security consultancy Cure53 to perform a complete security audit of its flagship VNC Connect remote access service. The audit included VNC Server and VNC Viewer on all supported platforms (Windows, Mac, Linux, Android, and iOS), the VNC Connect management portal, and backend services.