Security Advisory

Connected Device Security Report in the Time of COVID-19

How attackers can exploit RDP misconfigurations, and what you can do about it

  • Learn about the risks associated with RDP & how attackers can exploit the protocol
  • Read real-world examples of suspicious RDP activity detected by ExtraHop Reveal(x)
  • Find out how to use network detection and response to mitigate RDP-based attacks