Remote Desktop

We talk about all the newest information and stories about remote desktop technologies in this section. This includes new features, changes to security, and software releases. Keep up with changes in remote access software, troubleshooting advice, and the best ways to run remote desktop settings. Our articles keep you up to date on how remote desktop tools are changing and how these changes affect how we work together and share screens.

Visual Studio Tunnels Abused For Stealthy Remote AccessVisual Studio Tunnels Abused For Stealthy Remote Access

Visual Studio Tunnels Abused For Stealthy Remote Access

In an attack campaign dubbed "Operation Digital Eye," a suspected China-nexus threat actor has been observed targeting business-to-business IT service…

4 months ago
Weaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRATWeaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRAT

Weaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRAT

The threat actors distributed malicious JS scripts disguised as legitimate business documents, primarily in ZIP archives with names like "Purchase…

4 months ago
Massive Midnight Blizzard Phishing Attack Using Weaponized RDP FilesMassive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in various sectors. The attacks involve…

5 months ago
Hackers Downgrading Remote Desktop Security Setting For Unauthorized AccessHackers Downgrading Remote Desktop Security Setting For Unauthorized Access

Hackers Downgrading Remote Desktop Security Setting For Unauthorized Access

The attackers use a multi-stage attack, starting with a malicious LNK file disguised as a healthcare-related document. This file, likely…

5 months ago
ALPHV Ransomware Deployment Started With RDP Access And ScreenConnect InstallationsALPHV Ransomware Deployment Started With RDP Access And ScreenConnect Installations

ALPHV Ransomware Deployment Started With RDP Access And ScreenConnect Installations

Ransomware is used by hackers to abuse victims' data, locking it until a ransom is paid. This method of cyber…

10 months ago
Fog Ransomware Attacking Windows Servers Administrators To Steal RDP LoginsFog Ransomware Attacking Windows Servers Administrators To Steal RDP Logins

Fog Ransomware Attacking Windows Servers Administrators To Steal RDP Logins

A new ransomware variant dubbed ‘Fog’ has been spotted targeting US businesses in the education and recreation sectors. Forensic data…

10 months ago
GNOME Remote Desktop Vulnerability Let Attackers Read Login CredentialsGNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to create graphical sessions on the system…

10 months ago
VNC Is The Hacker’s New Remote Desktop Tool For Cyber AttacksVNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

While facilitating remote work, remote desktop software presents security challenges for IT teams due to the use of various tools…

11 months ago
Top 9 Best Remote Desktop Software for 2023Top 9 Best Remote Desktop Software for 2023

Top 9 Best Remote Desktop Software for 2023

In this virtual world, remote Desktop software is playing a major role Over 70% of Americans have a computer with…

2 years ago
HiatusRAT Malware Attack Routers to Gain Remote Access & Download FilesHiatusRAT Malware Attack Routers to Gain Remote Access & Download Files

HiatusRAT Malware Attack Routers to Gain Remote Access & Download Files

Lumen's Black Lotus Labs recently witnessed that Hackers are currently targeting DrayTek Vigor router models 2960 and 3900 in a…

2 years ago