CyberWire Daily cover image

Two RMMs walk into a phish… [Research Saturday]

CyberWire Daily

00:00

What RMM tools enable and why they're abused

Alex explains legitimate RMM uses and how attackers exploit their features for stealthy persistent access.

Play episode from 01:34
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app