Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Top exploits used by ransomware gangs are VPN bugs, but RDP still reigns supreme
Trends, Reports, Analysis
August 24, 2020
ZDNet
The top three most popular intrusion methods include unsecured RDP endpoints, email phishing, and the exploitation of corporate VPN appliances.
Read More
Ransomware Attack Methods
RDP Endpoints
VPN appliances
Ransomware Tactics
Publisher
Previous
Chromium DNS hijacking detection accused of being aroun ...
Trends, Reports, Analysis
Next
A Google Drive weakness could allow attackers to serve ...
Malware and Vulnerabilities