
From Security, Spoken: A Clever Honeypot Tricked Hackers Into Revealing Their Secrets
Business, Spoken
00:00
Exploring Cyber Criminals' Activities Through RDP Honeypot Research
Exploring the risks associated with insecure RDP logins, this chapter delves into GoSecure Researchers' use of Honeypots to track hackers infiltrating networks, identifying distinct hacker types and their objectives. It showcases the progression of attacks post-access, including reconnaissance, ransomware deployment, and crypto miner installations.
Play episode from 04:15
Transcript


