Submission + - Exposed RDP servers see 150K brute-force attempts per week (techrepublic.com)
Cameyo writes: From TechRepublic (https://tek.io/30aGVCm) — Remote Desktop Protocol (RDP) is—to the frustration of security professionals—both remarkably insecure and indispensable in enterprise computing. The September 2019 Patch Tuesday round closed two remote code execution bugs in RDP, while the high-profile BlueKeep and DejaBlue vulnerabilities from earlier this year have sent IT professionals in a patching frenzy. With botnets brute-forcing over 1.5 million RDP servers worldwide, a dedicated RDP security tool is needed to protect enterprise networks against security breaches.
Cameyo released on Wednesday an open-source RDP monitoring tool—appropriately titled RDPmon—for enterprises to identify and secure against RDP attacks in its environment. The tool provides a visualization of the total number of attempted RDP connections to servers, as well as a view of the currently running applications, the number of RDP users, and what programs those users are running, likewise providing insight to the existence of unapproved software. RDPmon operates entirely on-premise, the program data is not accessible to Cameyo.
Cameyo released on Wednesday an open-source RDP monitoring tool—appropriately titled RDPmon—for enterprises to identify and secure against RDP attacks in its environment. The tool provides a visualization of the total number of attempted RDP connections to servers, as well as a view of the currently running applications, the number of RDP users, and what programs those users are running, likewise providing insight to the existence of unapproved software. RDPmon operates entirely on-premise, the program data is not accessible to Cameyo.