Microsoft patches Remote Desktop Protocol exploit
“As long as companies properly monitor their internal environments for attacker behaviors, and can correlate this type of behavior with other attacker behaviors, they should have sufficient visibility to detect and respond to this type of reconnaissance behavior,” says Chris Morales, head of security analytics at Vectra.
The United States Sanction Russia in Response to Cyberattacks
President Biden Issues Sanctions Against Russia For Cyberattacks, Election Interference
Russian Foreign Intelligence Service Exploiting Five Publicly Known Vulnerabilities to Compromise U.S. and Allied Networks