Join Brad and Spencer from SecurIT360 as they dive into the latest phishing techniques involving malicious RDP files. Stay informed on how to protect your organization from these sophisticated cyber threats.
- Introduction to Midnight Blizzard (APT 29) and their new phishing tactics
- Explanation of RDP files and their capabilities
- Analysis of how RDP files are manipulated and used in attacks
- Steps to mitigate the threat, including firewall configurations and group policies
- The importance of user education in preventing phishing attacks
Blog:Â https://offsec.blog/
Youtube:Â https://www.youtube.com/@cyberthreatpov
Twitter:Â https://twitter.com/cyberthreatpov
Work with Us:Â https://securit360.com