Search Results for
remote desktop protocol
2018 in figures: How cyberthreats have evolved
Malware attacks were the most successful kind of attack on companies in 2018. Do you know what the other 5 most popular attack vectors were? Find out here.
How Did Cyberattacks Evolve in 2017?
Cybersecurity may be evolving, but attack techniques are evolving even faster. How will we rise to the challenge going into the new year?
2018 Will Be the Year of Malwareless Attacks
In 2018, malwareless attacks will gain momentum and become a definitive trend to watch out for. Traditional security solutions will no longer cut it.
Cryptocurrency Mining Takes its Toll on AWS Servers
Amazon Web Services servers were compromised by cybercriminals whose goal was to use their power for cryptocurrency mining.
WYSIWYE: A User-Friendly Interface for Cybercrooks
Personalized cyberattacks are on the rise. PandaLabs takes a look at a recent attack that even has it’s own interface for customizing attacks.
Sticky Attacks: When the operating system turns against you
Pandalabs detects and neutralizes an attack that does not use any malware as such. The “Sticky Keys” become a corporate nightmare.
RDPPatcher, the Attack that Sells Access to your Computer at a Low Price
PandaLabs has discovered a new attack whose aim in not data theft, nor encryption, but rather to sell access to your computer to third parties.