Business, Spoken cover image

From Security, Spoken: A Clever Honeypot Tricked Hackers Into Revealing Their Secrets

Business, Spoken

00:00

Exploring Cyber Criminals' Activities Through RDP Honeypot Research

Exploring the risks associated with insecure RDP logins, this chapter delves into GoSecure Researchers' use of Honeypots to track hackers infiltrating networks, identifying distinct hacker types and their objectives. It showcases the progression of attacks post-access, including reconnaissance, ransomware deployment, and crypto miner installations.

Play episode from 04:15
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app